{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:31Z","timestamp":1750220251171,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Security Agency - NCAE - C","award":["#H98230-21-1-0166"],"award-info":[{"award-number":["#H98230-21-1-0166"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519366","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"352-354","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting"],"prefix":"10.1145","author":[{"given":"Ramyapandian","family":"Vijayakanthan","sequence":"first","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"given":"Irfan","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University, Richmond, VA, USA"}]},{"given":"Aisha","family":"Ali-Gombe","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Checking is believing: Event-aware program anomaly detection in cyber-physical systems","author":"Cheng Long","year":"2019","unstructured":"Long Cheng , Ke Tian , Daphne Yao , Lui Sha , and Raheem A Beyah . 2019. Checking is believing: Event-aware program anomaly detection in cyber-physical systems . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Long Cheng, Ke Tian, Daphne Yao, Lui Sha, and Raheem A Beyah. 2019. Checking is believing: Event-aware program anomaly detection in cyber-physical systems. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_2_2_1","volume-title":"Mimicking attack by botnet and detection at gateway. Peer-to-Peer Networking and Applications","author":"Rama Krishna V","year":"2020","unstructured":"V Rama Krishna and R Subhashini . 2020. Mimicking attack by botnet and detection at gateway. Peer-to-Peer Networking and Applications ( 2020 ), 1--11. V Rama Krishna and R Subhashini. 2020. Mimicking attack by botnet and detection at gateway. Peer-to-Peer Networking and Applications (2020), 1--11."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3417313.3429384"},{"key":"e_1_3_2_2_4_1","unstructured":"Michal Zalewski. 2003. Memfetch. https:\/\/github.com\/citypw\/lcamtuf-memfetch  Michal Zalewski. 2003. Memfetch. https:\/\/github.com\/citypw\/lcamtuf-memfetch"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":4,"alternative-id":["10.1145\/3508398.3519366","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519366","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}