Related references
Note: Only part of the references are listed.Dataflow Management in the Internet of Things: Sensing, Control, and Security
Dawei Wei et al.
TSINGHUA SCIENCE AND TECHNOLOGY (2021)
One-dimensional convolutional auto-encoder-based feature learning for fault diagnosis of multivariate processes
Shumei Chen et al.
JOURNAL OF PROCESS CONTROL (2020)
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones
Weizhi Meng et al.
COMPUTERS & ELECTRICAL ENGINEERING (2019)
MagAttack: Guessing Application Launching and Operation via Smartphone
Yushi Cheng et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
Tracking Private Browsing Sessions using CPU-based Covert Channels
Nikolay Matyunin et al.
WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (2018)
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Raphael Spreitzer et al.
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) (2016)