Dynamic power consumption monitoring in SDR and CR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, 2009. ,
Power fingerprinting in SDR and CR integrity assessment, Proceedings of the IEEE Military Communications Conference, 2009. ,
Detecting unauthorized software execution in SDR using power fingerprinting, Proceedings of the IEEE Military Communications Conference, pp.2211-2216, 2010. ,
Power fingerprinting in unauthorized software execution detection for SDR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, pp.689-694, 2010. ,
Power fingerprinting in SDR integrity assessment for security and regulatory compliance, Analog Integrated Circuits and Signal Processing, vol.69, issue.2-3, pp.307-327, 2011. ,
The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000. ,
DOI : 10.1145/357830.357849
Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.225-238, 2008. ,
DOI : 10.1145/1378600.1378626
On Mobile Viruses Exploiting Messaging and Bluetooth Services, 2006 Securecomm and Workshops, 2006. ,
DOI : 10.1109/SECCOMW.2006.359562
Semanticsaware malware detection, Proceedings of the IEEE Symposium on Security and Privacy, pp.32-46, 2005. ,
Defending Embedded Systems with Software Symbiotes, Proceedings of the Fourteenth International Symposium on Recent Advances in Intrusion Detection, pp.358-377, 2011. ,
DOI : 10.1007/3-540-47870-1_10
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, 2012. ,
Distributed Sensor Objects for Intrusion Detection Systems, 2012 Ninth International Conference on Information Technology, New Generations, pp.417-424, 2012. ,
DOI : 10.1109/ITNG.2012.100
CloudAV: N-version antivirus in the network cloud, Proceedings of the Seventeenth USENIX Security Symposium, pp.91-106, 2008. ,
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems, Critical Infrastructure Protection, pp.31-46, 2011. ,
DOI : 10.1007/978-3-642-24864-1_3
Radio-Frequency-Based Programmable Logic Controller Anomaly Detection, 2013. ,
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure, International Journal of Critical Infrastructure Protection, vol.5, issue.2, pp.66-73, 2012. ,
DOI : 10.1016/j.ijcip.2012.05.001
Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011. ,
DOI : 10.1016/S1353-4858(11)70086-1