{"id":"https://openalex.org/W2978751864","doi":"https://doi.org/10.1109/iolts.2019.8854456","title":"Empirical Evaluation on Anomaly Behavior Detection for Low-Cost Micro-Controllers Utilizing Accurate Power Analysis","display_name":"Empirical Evaluation on Anomaly Behavior Detection for Low-Cost Micro-Controllers Utilizing Accurate Power Analysis","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2978751864","doi":"https://doi.org/10.1109/iolts.2019.8854456","mag":"2978751864"},"language":"en","primary_location":{"id":"doi:10.1109/iolts.2019.8854456","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2019.8854456","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066000044","display_name":"Kento Hasegawa","orcid":"https://orcid.org/0000-0002-6517-1703"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kento Hasegawa","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746117","display_name":"Kiyoshi Chikamatsu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kiyoshi Chikamatsu","raw_affiliation_strings":["Keysight Technologies International Japan G.K"],"affiliations":[{"raw_affiliation_string":"Keysight Technologies International Japan G.K","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087516286","display_name":"Nozomu Togawa","orcid":"https://orcid.org/0000-0003-3400-3587"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nozomu Togawa","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066000044"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":0.7001,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78325383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"54","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6604940891265869},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5901041626930237},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.45411068201065063},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.325203001499176},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.22202372550964355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2191556692123413},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2116086483001709},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06533309817314148}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6604940891265869},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5901041626930237},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.45411068201065063},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.325203001499176},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.22202372550964355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2191556692123413},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2116086483001709},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06533309817314148},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iolts.2019.8854456","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2019.8854456","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1967864446","https://openalex.org/W2127218421","https://openalex.org/W2144182447","https://openalex.org/W2557621347","https://openalex.org/W2733002728","https://openalex.org/W2896956588","https://openalex.org/W4235106014","https://openalex.org/W4254182148","https://openalex.org/W6678914141"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Since":[0],"hardware/software":[1],"vendors":[2,17,21],"produce":[3],"their":[4,13,36],"IoT":[5,37],"products":[6],"easily":[7],"and":[8,77,92,113,153],"inexpensively,":[9],"they":[10],"often":[11],"outsource":[12],"designs":[14],"to":[15,26,40],"third-party":[16,20],"where":[18],"malicious":[19],"can":[22],"have":[23],"a":[24,45,88,99,103],"chance":[25],"insert":[27],"software":[28],"Trojans":[29],"as":[30,32,120],"well":[31],"\u201chardware":[33],"Trojans\u201d":[34],"into":[35,82,93],"devices.":[38],"How":[39],"tackle":[41],"the":[42,74,83,94,110,130,145,154],"issue":[43],"becomes":[44],"serious":[46],"concern":[47],"these":[48],"days.":[49],"In":[50,139],"this":[51],"paper,":[52],"we":[53,108,124,142],"propose":[54],"an":[55,135],"anomaly":[56],"behavior":[57,127],"detection":[58,137],"method":[59,68,147,161],"utilizing":[60,134,148],"accurate":[61],"power":[62,71,115],"analysis":[63],"for":[64],"low-cost":[65],"micro-controllers.":[66],"Our":[67],"accurately":[69],"measures":[70],"consumption":[72],"of":[73,151],"target":[75],"device,":[76],"then":[78],"classifies":[79],"its":[80],"waveform":[81],"sleep-mode":[84],"part,":[85,96],"in":[86,97,102],"which":[87,98],"micro-controller":[89,100],"saves":[90],"power,":[91],"active-mode":[95,118],"works":[101],"normal":[104],"operation.":[105],"After":[106],"that,":[107],"obtain":[109],"duration":[111],"time":[112],"consumed":[114],"from":[116],"each":[117],"period":[119],"feature":[121,132],"values.":[122],"Finally,":[123],"detect":[125],"abnormal":[126,164],"based":[128],"on":[129],"obtained":[131],"values":[133],"outlier":[136],"method.":[138],"our":[140,159],"experiments,":[141],"empirically":[143],"evaluate":[144],"proposed":[146,160],"two":[149],"types":[150],"micro-controllers,":[152],"experimental":[155],"results":[156],"demonstrate":[157],"that":[158],"successfully":[162],"detects":[163],"behaviors.":[165]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
