C. , A. Gonzalez, and J. Reed, Dynamic power consumption monitoring in SDR and CR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, 2009.

C. , A. Gonzalez, and J. Reed, Power fingerprinting in SDR and CR integrity assessment, Proceedings of the IEEE Military Communications Conference, 2009.

C. , A. Gonzalez, and J. Reed, Detecting unauthorized software execution in SDR using power fingerprinting, Proceedings of the IEEE Military Communications Conference, pp.2211-2216, 2010.

C. , A. Gonzalez, and J. Reed, Power fingerprinting in unauthorized software execution detection for SDR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, pp.689-694, 2010.

C. , A. Gonzalez, and J. Reed, Power fingerprinting in SDR integrity assessment for security and regulatory compliance, Analog Integrated Circuits and Signal Processing, vol.69, issue.2-3, pp.307-327, 2011.

S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000.
DOI : 10.1145/357830.357849

A. Bose, X. Hu, K. Shin, and T. Park, Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.225-238, 2008.
DOI : 10.1145/1378600.1378626

A. Bose and K. Shin, On Mobile Viruses Exploiting Messaging and Bluetooth Services, 2006 Securecomm and Workshops, 2006.
DOI : 10.1109/SECCOMW.2006.359562

M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, Semanticsaware malware detection, Proceedings of the IEEE Symposium on Security and Privacy, pp.32-46, 2005.

A. Cui and S. Stolfo, Defending Embedded Systems with Software Symbiotes, Proceedings of the Fourteenth International Symposium on Recent Advances in Intrusion Detection, pp.358-377, 2011.
DOI : 10.1007/3-540-47870-1_10

S. Das, K. Kant, and N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, 2012.

H. Erbacher and S. Hutchinson, Distributed Sensor Objects for Intrusion Detection Systems, 2012 Ninth International Conference on Information Technology, New Generations, pp.417-424, 2012.
DOI : 10.1109/ITNG.2012.100

J. Oberheide, E. Cooke, and F. Jahanian, CloudAV: N-version antivirus in the network cloud, Proceedings of the Seventeenth USENIX Security Symposium, pp.91-106, 2008.

J. Reeves, A. Ramaswamy, M. Locasto, S. Bratus, and S. Smith, Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems, Critical Infrastructure Protection, pp.31-46, 2011.
DOI : 10.1007/978-3-642-24864-1_3

S. Stone, Radio-Frequency-Based Programmable Logic Controller Anomaly Detection, 2013.

S. Stone and M. Temple, Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure, International Journal of Critical Infrastructure Protection, vol.5, issue.2, pp.66-73, 2012.
DOI : 10.1016/j.ijcip.2012.05.001

C. Tankard, Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011.
DOI : 10.1016/S1353-4858(11)70086-1