{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:40:00Z","timestamp":1761129600519,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_36","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"417-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2461-343X","authenticated-orcid":false,"given":"Pascal","family":"Oser","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8676-2353","authenticated-orcid":false,"given":"Stefan","family":"L\u00fcders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"36_CR1","unstructured":"GARTNER. \nhttps:\/\/www.gartner.com\/newsroom\/id\/3598917\n\n. Accessed 05 Feb 2018"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Miettinen, M., et al.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177\u20132184. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.283"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing, pp. 506\u2013509. ACM (2017)","DOI":"10.1145\/3019612.3019878"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Jaafar, F.: An integrated architecture for IoT fingerprinting. In: 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 601\u2013602. IEEE (2017)","DOI":"10.1109\/QRS-C.2017.112"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Bratus, S., et al.: Active behavioral fingerprinting of wireless devices. In: Proceedings of the first ACM Conference on Wireless Network Security, pp. 56\u201361. ACM (2008)","DOI":"10.1145\/1352533.1352543"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Kassem, M.M., et al.: A clock skew addressing scheme for Internet of Things. In: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), pp. 1553\u20131557. IEEE (2014)","DOI":"10.1109\/PIMRC.2014.7136415"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Huang, D.-J., et al.: Clock skew based node identification in wireless sensor networks. In: Global Telecommunications Conference 2008. IEEE GLOBECOM 2008, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.363"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Huang, D.-J., et al.: Clock skew based client device identification in cloud environments. In: 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 526\u2013533. IEEE (2012)","DOI":"10.1109\/AINA.2012.51"},{"key":"36_CR9","unstructured":"Internet Engineering Task Force, Transmission Control Protocol. \nhttps:\/\/tools.ietf.org\/html\/rfc793\n\n. Accessed 05 July 2018"},{"key":"36_CR10","unstructured":"Kamp, P.-H.: Timecounters: efficient and precise timekeeping in SMP kernels. In: Proceedings of the BSDCon Europe (2002)"},{"key":"36_CR11","unstructured":"Internet Engineering Task Force, TCP Extensions for High Performance. \nhttps:\/\/tools.ietf.org\/html\/rfc1323\n\n\/. Accessed 05 July 2018"},{"issue":"2","key":"36_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., et al.: Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"36_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik, K.: Approximation capabilities of multilayer feedforward networks. Neural Netw. 4(2), 251\u2013257 (1991)","journal-title":"Neural Netw."},{"key":"36_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34239-7","volume-title":"Estimation of Dependences Based on Empirical Data","author":"V Vapnik","year":"2006","unstructured":"Vapnik, V.: Estimation of Dependences Based on Empirical Data. Springer, New York (2006). \nhttps:\/\/doi.org\/10.1007\/0-387-34239-7"},{"issue":"1","key":"36_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 233\u2013240. ACM (2006)","DOI":"10.1145\/1143844.1143874"},{"issue":"3","key":"36_CR17","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., et al.: Classification and regression by randomForest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"issue":"3","key":"36_CR18","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"5","key":"36_CR19","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TDSC.2014.2369033","volume":"12","author":"SV Radhakrishnan","year":"2015","unstructured":"Radhakrishnan, S.V., et al.: GTID: a technique for physical device and device type fingerprinting. IEEE Trans. Dependable Secur. Comput. 12(5), 519\u2013532 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"36_CR20","doi-asserted-by":"publisher","first-page":"066138","DOI":"10.1103\/PhysRevE.69.066138","volume":"69","author":"A Kraskov","year":"2004","unstructured":"Kraskov, A., et al.: Estimating mutual information. Phys. Rev. E 69(6), 066138 (2004)","journal-title":"Phys. Rev. E"},{"key":"36_CR21","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"2017","unstructured":"Breiman, L.: Classification and Regression Trees. Routledge, Abingdon (2017)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:23:52Z","timestamp":1544174632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}