{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:01Z","timestamp":1761621421039},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_19","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"229-239","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["TrCMP: An App Usage Inference Method for Mobile Service Enhancement"],"prefix":"10.1007","author":[{"given":"Xuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Wajid","family":"Rafique","sequence":"additional","affiliation":[]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Xu, Q., et al.: Automatic generation of mobile app signatures from traffic observations. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 1481\u20131489 (2015)","DOI":"10.1109\/INFOCOM.2015.7218526"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 439\u2013454 (2016)","DOI":"10.1109\/EuroSP.2016.40"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Jin, X., Sun, J., Zhang, R., Zhang, Y.: POWERFUL: mobile app fingerprinting via power analysis. In: IEEE INFOCOM 2017, IEEE Conference on Computer Communications, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8057232"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2018","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 13(1), 63\u201378 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Dai, S., Tongaonkar, A., Wang, X., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of android apps. In: 2013 Proceedings IEEE INFOCOM, pp. 809\u2013817 (2013)","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Zhou, X., et al.: Identity, location, disease and more: inferring your secrets from android public resources, pp. 1017\u20131028 (2013)","DOI":"10.1145\/2508859.2516661"},{"issue":"8","key":"19_CR7","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"TK Ho","year":"1998","unstructured":"Ho, T.K.: The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 832\u2013844 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Khomh, F., Yuan, H., Zou, Y.: Adapting Linux for mobile platforms: an empirical study of Android. In: 2012 28th IEEE International Conference on Software Maintenance (ICSM), pp. 629\u2013632 (2012)","DOI":"10.1109\/ICSM.2012.6405339"},{"issue":"4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TSE.2017.2685387","volume":"44","author":"X Liu","year":"2018","unstructured":"Liu, X., Li, H., Lu, X., Xie, T., Mei, Q., Feng, F., Mei, H.: Understanding diverse usage patterns from large-scale appstore-service profiles. IEEE Trans. Softw. Eng. 44(4), 384\u2013411 (2018)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Shehu, Z., Ciccotelli, C., Ucci, D., Aniello, L., Baldoni, R.: Towards the usage of invariant-based app behavioral fingerprinting for the detection of obfuscated versions of known malware. In: International Conference on Next Generation Mobile Applications, Security and Technologies, pp. 121\u2013126 (2016)","DOI":"10.1109\/NGMAST.2016.16"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Yang, L., Yuan, M., Wang, W., Zhang, Q., Zeng, J.: Apps on the move: a fine-grained analysis of usage behavior of mobile apps. In: 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524464"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:02:45Z","timestamp":1573070565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}