{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:31:52Z","timestamp":1762522312550,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8715057","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"776-781","source":"Crossref","is-referenced-by-count":37,"title":["Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks"],"prefix":"10.23919","author":[{"given":"Sai Manoj","family":"Pudukotai Dinakarrao","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[]},{"given":"Hosein Mohammadi","family":"Makrani","sequence":"additional","affiliation":[]},{"given":"Cameron","family":"Nowzari","sequence":"additional","affiliation":[]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/3214374"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2015.2495000"},{"key":"ref12","article-title":"Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning","author":"sayadi","year":"2018","journal-title":"ACM Int Conf on Computing Frontiers"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"article-title":"CVX: Matlab software for disciplined convex programming, version 2.1","year":"2014","author":"grant","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.111211.101963"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314402"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.01.002"},{"journal-title":"Intel 64 and IA-32 architectures software developer's manual","year":"2016","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284681"},{"key":"ref5","article-title":"Insecurity in the internet of things","author":"barcena","year":"2015","journal-title":"Whitepaper"},{"journal-title":"Yankee doodle","year":"2007","key":"ref8"},{"journal-title":"badbios","year":"2013","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"The internet of things: How the next evolution of the internet is changing everything","author":"evans","year":"2011","journal-title":"Cisco white paper"},{"key":"ref1","article-title":"A survey on sensor-based threats to internet-of-things (IoT) devices and applications","volume":"abs 1802 2041","author":"sikder","year":"2018","journal-title":"CoRR"},{"journal-title":"Magnetorheology","year":"2017","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","article-title":"SPEC CPU2006 benchmark descriptions","volume":"34","author":"henning","year":"2006","journal-title":"SIGARCH Comput Archit News"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2857055"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2019,3,25]]},"location":"Florence, Italy","end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08715057.pdf?arnumber=8715057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:49:30Z","timestamp":1559605770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8715057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8715057","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}