暂无分享,去创建一个
Stacy J. Prowell | Robert A. Bridges | Katerina Goseva-Popstojanova | Jeffrey A. Nichols | Jarilyn M. Hernández Jiménez
[1] Carlos Aguayo Gonzalez,et al. Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting , 2014, Critical Infrastructure Protection.
[2] P. Vinod,et al. Similarity Measure for Obfuscated Malware Analysis , 2014 .
[3] Hongyu Yang,et al. Power Consumption Based Android Malware Detection , 2016, J. Electr. Comput. Eng..
[4] Kieran McLaughlin,et al. Obfuscation: The Hidden Malware , 2011, IEEE Security & Privacy.
[5] Jeffrey H. Reed,et al. Power fingerprinting in SDR & CR integrity assessment , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[6] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[7] J. H. Reed,et al. Enhancing Smart Grid cyber security using power fingerprinting: Integrity assessment and intrusion detection , 2012, 2012 Future of Instrumentation International Workshop (FIIW) Proceedings.
[8] Rui Yang,et al. Detecting Malware Variants by Byte Frequency , 2011, J. Networks.
[9] Wenyuan Xu,et al. WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices , 2013, HealthTech.
[10] Thorsten Holz,et al. Mobile Malware Detection Based on Energy Fingerprints - A Dead End? , 2013, RAID.
[11] Jeffrey H. Reed,et al. Power fingerprinting in SDR integrity assessment for security and regulatory compliance , 2011 .