• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719626)   Today's Articles (1045)
For: Luckett P, McDonald JT, Glisson WB, Benton R, Dawson J, Doyle BA. Identifying stealth malware using CPU power consumption and learning algorithms. JCS 2018. [DOI: 10.3233/jcs-171060] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Number Cited by Other Article(s)
1
Almshari M, Tsaramirsis G, Khadidos AO, Buhari SM, Khan FQ, Khadidos AO. Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data. SENSORS 2020;20:s20185075. [PMID: 32906665 PMCID: PMC7570659 DOI: 10.3390/s20185075] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/18/2020] [Revised: 09/03/2020] [Accepted: 09/04/2020] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA