Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Article Swipe
Jorge Barredo
,
Maialen Eceiza
,
José Luis Flores
,
Mikel Iturbe
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s10207-025-01127-8
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s10207-025-01127-8
Related Topics
Concepts
No concepts available.
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s10207-025-01127-8
- https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdf
- OA Status
- hybrid
- OpenAlex ID
- https://openalex.org/W4414779122
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4414779122Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s10207-025-01127-8Digital Object Identifier
- Title
-
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systemsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-10-01Full publication date if available
- Authors
-
Jorge Barredo, Maialen Eceiza, José Luis Flores, Mikel IturbeList of authors in order
- Landing page
-
https://doi.org/10.1007/s10207-025-01127-8Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdfDirect OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4414779122 |
|---|---|
| doi | https://doi.org/10.1007/s10207-025-01127-8 |
| ids.doi | https://doi.org/10.1007/s10207-025-01127-8 |
| ids.openalex | https://openalex.org/W4414779122 |
| fwci | 0.0 |
| type | article |
| title | Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
| biblio.issue | 5 |
| biblio.volume | 24 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.958899974822998 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.954200029373169 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T10734 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9078999757766724 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Information and Cyber Security |
| is_xpac | False |
| apc_list.value | 2590 |
| apc_list.currency | EUR |
| apc_list.value_usd | 3190 |
| apc_paid.value | 2590 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 3190 |
| language | en |
| locations[0].id | doi:10.1007/s10207-025-01127-8 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S164062316 |
| locations[0].source.issn | 1615-5262, 1615-5270 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1615-5262 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Information Security |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Information Security |
| locations[0].landing_page_url | https://doi.org/10.1007/s10207-025-01127-8 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5041264455 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5552-6825 |
| authorships[0].author.display_name | Jorge Barredo |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Jorge Barredo |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5076216328 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7755-2848 |
| authorships[1].author.display_name | Maialen Eceiza |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Maialen Eceiza |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5035500193 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5555-9712 |
| authorships[2].author.display_name | José Luis Flores |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jose Luis Flores |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5050357792 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-9641-5646 |
| authorships[3].author.display_name | Mikel Iturbe |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Mikel Iturbe |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.958899974822998 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/s10207-025-01127-8 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S164062316 |
| best_oa_location.source.issn | 1615-5262, 1615-5270 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1615-5262 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Information Security |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Information Security |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s10207-025-01127-8 |
| primary_location.id | doi:10.1007/s10207-025-01127-8 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S164062316 |
| primary_location.source.issn | 1615-5262, 1615-5270 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1615-5262 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Information Security |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01127-8.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Information Security |
| primary_location.landing_page_url | https://doi.org/10.1007/s10207-025-01127-8 |
| publication_date | 2025-10-01 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.55096471 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |