{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:36:42Z","timestamp":1763141802857,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/syscon53536.2022.9773803","type":"proceedings-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:45:11Z","timestamp":1652733911000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["General Process Detection Through Physical Side Channel Characterization"],"prefix":"10.1109","author":[{"given":"Michael A.","family":"Taylor","sequence":"first","affiliation":[{"name":"Darwin Deason Institute Southern Methodist University,Dallas,TX,USA"}]},{"given":"Eric C.","family":"Larson","sequence":"additional","affiliation":[{"name":"Darwin Deason Institute Southern Methodist University,Dallas,TX,USA"}]},{"given":"Mitchell A.","family":"Thornton","sequence":"additional","affiliation":[{"name":"Darwin Deason Institute Southern Methodist University,Dallas,TX,USA"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424260"},{"key":"ref10","first-page":"1","article-title":"Realtime edge prrocessing detection of malicious attacks using machine learning and processor core events","author":"oshana","year":"2021","journal-title":"Proceedings of 2021 IEEE Systems Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3082471"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"article-title":"Hardware Monitor: Reference Manual","year":"2017","author":"bresink","key":"ref14"},{"journal-title":"Individual Edition|Anaconda","year":"0","key":"ref15"},{"journal-title":"Individual Edition|Anaconda","year":"0","key":"ref16"},{"journal-title":"Deep Learning with Python","year":"2017","author":"chollet","key":"ref17"},{"article-title":"Scikit-Learn User Guide","year":"2010","author":"pedregosa","key":"ref18"},{"key":"ref19","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"article-title":"Increasing number of false positives causing risk of alert fatigue","year":"2020","author":"h n s m","key":"ref28"},{"article-title":"How Fast Does Ransomware Encrypt Files? Faster Than You Think","year":"2016","author":"correa","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527943"},{"year":"2016","key":"ref6","article-title":"Alert (TA16-091A) Ransomeware and Recent Variants"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.8"},{"article-title":"What&#x2019;s Next for Ransomware in 2021?","year":"2020","author":"bracken","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501972"},{"key":"ref7","first-page":"1","article-title":"Side-channel assisted malware classifier with gradient descent correction for embedded platforms","volume":"7","author":"alam","year":"2018","journal-title":"7th International Workshop on Security Proofs for Embedded Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415692"},{"key":"ref9","first-page":"65","article-title":"An automatic network protocol reverse engineering method for vulnerability discovery","author":"wu","year":"2015","journal-title":"Network Security and Communication Engineering"},{"article-title":"Anomoly and malware detection using side channel analysis","year":"2016","author":"kune","key":"ref1"},{"year":"0","key":"ref20","article-title":"vikyd\/go-cpu-load: Generate cpu load on windows\/linux\/mac"},{"journal-title":"Iozone Filesystem Benchmark","year":"0","key":"ref22"},{"year":"0","key":"ref21","article-title":"Colinianking\/stress-ng: This is the stress-ng upstream project git repository. stress-ng will stress test a computer system in various selectable ways. it was designed to exercise various physical subsystems of a computer as well as the various operating system kernel interfaces"},{"journal-title":"nmap Security Scanner","year":"0","key":"ref24"},{"journal-title":"FFmpeg a complete cross-platform solution to record convert and stream audio and video","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.08.003"},{"journal-title":"Vmware fusion 12 pro","year":"0","key":"ref25"}],"event":{"name":"2022 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2022,4,25]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2022,4,28]]}},"container-title":["2022 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9773363\/9773791\/09773803.pdf?arnumber=9773803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:09:19Z","timestamp":1655154559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9773803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/syscon53536.2022.9773803","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}