{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:45:19Z","timestamp":1765827919595,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116369","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"562-567","source":"Crossref","is-referenced-by-count":4,"title":["Statistical Time-based Intrusion Detection in Embedded Systems"],"prefix":"10.23919","author":[{"given":"Nadir A.","family":"Carreon","sequence":"first","affiliation":[]},{"given":"Allison","family":"Gilbreath","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Lysecky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"161","article-title":"Automating Mimicry Attacks using Static Binary Analysis","author":"kruegel","year":"2005","journal-title":"USENIX Security Symposium"},{"key":"ref11","article-title":"The vulnerability of UAVs to cyber attacks&#x2014; An approach to the risk assessment","author":"hartmann","year":"2013","journal-title":"Proc Conf Cyber Conflict"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2514\/6.2012-2438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_39"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593095"},{"key":"ref16","first-page":"342","article-title":"Folded Empirical Distribution Function Curves-Mountain Plots","volume":"49","author":"monti","year":"1995","journal-title":"The American Statistician"},{"key":"ref17","first-page":"392","volume":"i","author":"chakravarti","year":"1967","journal-title":"Handbook of Methods of Applied Statistics"},{"key":"ref18","article-title":"SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems","author":"yoon","year":"2013","journal-title":"Real-Time and Embedded Technology and Applications Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.12"},{"key":"ref28","first-page":"526","article-title":"Support Vector Method for Novelty Detection","author":"schlkopf","year":"1999","journal-title":"Advances in neural information processing systems"},{"key":"ref4","article-title":"Characterization of Potential Security Threats in Modern Automobiles: A Composite Modeling Approach","author":"mccarthy","year":"2014","journal-title":"National Highway Traffic Safety Administration Tech Rep"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2827699"},{"key":"ref3","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"e-Health Networking Applications and Services"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"European Commission Enterprise and Industry Directorate-General Tech Rep","article-title":"Study Analysing The Current Activities in The Field of UAV","year":"2007","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.600"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1176254.1176281"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086305"},{"journal-title":"Threats Report","year":"2018","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"ref1","article-title":"The Internet of Things: How the Next Evolution of the Internet Is Changing Everything","author":"evans","year":"2013","journal-title":"Cisco white paper"},{"key":"ref20","first-page":"27","article-title":"Data-driven Anomaly Detection with Timing Features for Embedded Systems. ACM Trans. Des","volume":"24","author":"lu","year":"2019","journal-title":"Automot Electron Syst"},{"key":"ref22","first-page":"1","article-title":"Architectural Frameworks for Security and Reliability of MPSoCs","author":"patel","year":"2010","journal-title":"IEEE Transactions on very large scale integration Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1391469.1391686"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_13"},{"key":"ref23","first-page":"177","article-title":"Non-control-data attacks are realistic threats","author":"chen","year":"2005","journal-title":"Usenix Security Symp"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1814217.1814218"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116369.pdf?arnumber=9116369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:42:57Z","timestamp":1594680177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116369","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}