ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
0
references
Top references
cited by
1
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,101
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
CASPER an efficient approach to detect anomalous code execution from unintended electronic device emissions
Author(s):
Scott C. Alexander
,
Hira Agrawal
,
Ray Chen
,
Jeffrey Hollingsworth
,
Christine Hung
,
Rauf Izmailov
,
John Koshy
,
Joe Liberti
,
Chris Mesterharm
,
Josh Morman
,
Thimios Panagos
,
Marc Pucci
,
Isil Sebuktekin
,
Simon Tsang
Publication date:
2018
Journal:
Cyber Sensing 2018
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Good practices in (cog-neuro) science and science communication
Author and article information
Journal
DOI::
10.1117/12.2500234
ScienceOpen disciplines:
Computer science
,
Statistics
,
Machine learning
,
Artificial intelligence
Data availability:
ScienceOpen disciplines:
Computer science
,
Statistics
,
Machine learning
,
Artificial intelligence
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,101
Community Assessment for Public Health Emergency Response (CASPER)
Authors:
Community Assessment for Public Health Emergency Response (CASPER) Toolkit. Third edition
Authors:
The New Casper: A Privacy-Aware Location-Based Database Server
Authors:
Mohamed F. Mokbel
,
Chi-Yin Chow
,
Walid G. Aref
See all similar
Cited by
1
A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Authors:
Chris Mesterharm
,
Rauf Izmailov
,
Scott Alexander
…
See all cited by