Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection
暂无分享,去创建一个
Nhien-An Le-Khac | Mark Scanlon | Luis Miralles-Pechuán | Asanka Sayakkara | M. Scanlon | A. Sayakkara | Luis Miralles-Pechuán | Nhien-An Le-Khac
[1] Thomas P. Hayes,et al. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.
[2] Nhien-An Le-Khac,et al. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices , 2019, Digit. Investig..
[3] T Souvignet,et al. Differential Power Analysis as a digital forensic tool. , 2013, Forensic science international.
[4] Nhien-An Le-Khac,et al. Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis , 2018, ISSTA/ECOOP Workshops.
[5] María de Lourdes Martínez-Villaseñor,et al. A Flexible Approach for Human Activity Recognition Using Artificial Hydrocarbon Networks , 2016, Sensors.
[6] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[7] Nhien-An Le-Khac,et al. Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors , 2018, ARES.
[8] Nhien-An Le-Khac,et al. A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics , 2019, Digit. Investig..
[9] Kalyanmoy Deb,et al. A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimisation: NSGA-II , 2000, PPSN.
[10] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[11] P. Kocher,et al. Differential power analysis, advances in cryptology-CRYPTO'99 , 1999 .
[12] Milos Prvulovic,et al. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[13] Milos Prvulovic,et al. A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems , 2017, IEEE Transactions on Electromagnetic Compatibility.
[14] E Murray,et al. A flexible approach. , 1988, Elderly care.
[15] Aixia Guo,et al. Gene Selection for Cancer Classification using Support Vector Machines , 2014 .
[16] Hua Liu,et al. Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations , 2017, CCS.
[17] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[18] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[19] Milos Prvulovic,et al. EDDIE: EM-based detection of deviations in program execution , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[20] Brett A. Becker,et al. Current Challenges and Future Research Areas for Digital Forensic Investigation , 2016, ArXiv.
[21] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[22] E. Altman. PREDICTING FINANCIAL DISTRESS OF COMPANIES: REVISITING THE Z-SCORE AND ZETA ® MODELS , 2013 .
[23] Gavin Brown,et al. Deep learning-based classification and anomaly detection of side-channel signals , 2018, Defense + Security.
[24] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[25] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[26] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[27] Samuel J. Stone,et al. Radio frequency based reverse engineering of microcontroller program execution , 2015, 2015 National Aerospace and Electronics Conference (NAECON).
[28] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[29] C. L. Giles,et al. Dynamic recurrent neural networks: Theory and applications , 1994, IEEE Trans. Neural Networks Learn. Syst..