{"id":"https://openalex.org/W3179258584","doi":"https://doi.org/10.1587/transfun.2020kep0001","title":"An Anomalous Behavior Detection Method Utilizing Extracted Application-Specific Power Behaviors","display_name":"An Anomalous Behavior Detection Method Utilizing Extracted Application-Specific Power Behaviors","publication_year":2021,"publication_date":"2021-07-07","ids":{"openalex":"https://openalex.org/W3179258584","doi":"https://doi.org/10.1587/transfun.2020kep0001","mag":"3179258584"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2020kep0001","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2020kep0001","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070118828","display_name":"Kazunari Takasaki","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazunari TAKASAKI","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019812268","display_name":"Ryoichi Kida","orcid":"https://orcid.org/0000-0002-7719-3037"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ryoichi KIDA","raw_affiliation_strings":["LAC Co., Ltd"],"affiliations":[{"raw_affiliation_string":"LAC Co., Ltd","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087516286","display_name":"Nozomu Togawa","orcid":"https://orcid.org/0000-0003-3400-3587"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nozomu TOGAWA","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070118828"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5863628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"E104.A","issue":"11","first_page":"1555","last_page":"1565"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/waveform","display_name":"Waveform","score":0.7911928296089172},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7905702590942383},{"id":"https://openalex.org/keywords/local-outlier-factor","display_name":"Local outlier factor","score":0.634545087814331},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.6015535593032837},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5478798747062683},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5145039558410645},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.48227694630622864},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.47919735312461853},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47256746888160706},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.4518919289112091},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.4424932301044464},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3946075737476349},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3839994966983795},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2883860468864441},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26638132333755493},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12154820561408997},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1092883050441742},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08991551399230957},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.06810164451599121}],"concepts":[{"id":"https://openalex.org/C197424946","wikidata":"https://www.wikidata.org/wiki/Q1165717","display_name":"Waveform","level":3,"score":0.7911928296089172},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7905702590942383},{"id":"https://openalex.org/C169029474","wikidata":"https://www.wikidata.org/wiki/Q387942","display_name":"Local outlier factor","level":3,"score":0.634545087814331},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.6015535593032837},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5478798747062683},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5145039558410645},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.48227694630622864},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.47919735312461853},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47256746888160706},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.4518919289112091},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.4424932301044464},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3946075737476349},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3839994966983795},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2883860468864441},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26638132333755493},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12154820561408997},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1092883050441742},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08991551399230957},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.06810164451599121},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2020kep0001","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2020kep0001","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1497336187","https://openalex.org/W1564179502","https://openalex.org/W2012032225","https://openalex.org/W2016695132","https://openalex.org/W2038861118","https://openalex.org/W2130066128","https://openalex.org/W2144182447","https://openalex.org/W2145937629","https://openalex.org/W2161998562","https://openalex.org/W2557621347","https://openalex.org/W2612667056","https://openalex.org/W2739579953","https://openalex.org/W2782942991","https://openalex.org/W2792814953","https://openalex.org/W2914636610","https://openalex.org/W2978751864","https://openalex.org/W3047958114","https://openalex.org/W4235106014","https://openalex.org/W4239924842","https://openalex.org/W4411584822"],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W2770832849","https://openalex.org/W3111802945","https://openalex.org/W114119537","https://openalex.org/W2912112202","https://openalex.org/W4240627425","https://openalex.org/W2761705761","https://openalex.org/W205872183","https://openalex.org/W2019014808","https://openalex.org/W2946096271"],"abstract_inverted_index":{"With":[0],"the":[1,25,38,94,110,120,131,160,192,205],"widespread":[2],"use":[3],"of":[4,6,17,37,88],"Internet":[5],"Things":[7],"(IoT)":[8],"devices":[9,19,53],"in":[10,20,166],"recent":[11],"years,":[12],"we":[13,67,84,98,115],"utilize":[14],"a":[15,106,183],"variety":[16],"hardware":[18,28],"our":[21,144],"daily":[22],"life.":[23],"On":[24],"other":[26,161],"hand,":[27],"security":[29],"issues":[30],"are":[31,62,180],"emerging.":[32],"Power":[33],"analysis":[34],"is":[35,46],"one":[36,148],"methods":[39],"to":[40,48,51,141],"detect":[41,125],"anomalous":[42,70,127,155,170,197],"behaviors,":[43,203],"but":[44],"it":[45,50],"hard":[47],"apply":[49],"IoT":[52,76,90],"where":[54],"an":[55,69,75,89,100,126,154,169],"operating":[56],"system":[57],"and":[58,92,124,153,159,168],"various":[59],"software":[60],"programs":[61,152,165,176],"running.":[63],"In":[64],"this":[65],"paper,":[66],"propose":[68],"behavior":[71,128],"detection":[72],"method":[73,146,194],"for":[74],"device":[77],"by":[78,104,129,199],"extracting":[79,200],"application-specific":[80,101,121,201],"power":[81,86,95,102,112,122,202],"behaviors.":[82],"First,":[83],"measure":[85],"consumption":[87],"device,":[91],"obtain":[93],"waveform.":[96,113],"Next,":[97],"extract":[99,116],"waveform":[103,123],"eliminating":[105],"steady":[107],"factor":[108,134],"from":[109,119],"obtained":[111],"Finally,":[114],"feature":[117],"values":[118],"utilizing":[130],"local":[132],"outlier":[133],"(LOF)":[135],"method.":[136],"We":[137],"conduct":[138],"two":[139],"experiments":[140,179],"show":[142],"how":[143],"proposed":[145,193],"works:":[147],"runs":[149,162],"three":[150,163],"application":[151,156,164,171],"program":[157,172],"randomly":[158],"series":[167],"very":[173],"rarely.":[174],"Application":[175],"on":[177,182],"both":[178],"implemented":[181],"single":[184],"board":[185],"computer.":[186],"The":[187],"experimental":[188],"results":[189],"demonstrate":[190],"that":[191],"successfully":[195],"detects":[196],"behaviors":[198],"while":[204],"existing":[206],"approaches":[207],"cannot.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
