{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:57:54Z","timestamp":1743062274777,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030273545"},{"type":"electronic","value":"9783030273552"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27355-2_3","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:03:04Z","timestamp":1566169384000},"page":"32-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mobile Device Identification via User Behavior Analysis"],"prefix":"10.1007","author":[{"given":"Kadriye","family":"Dogan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6229-7343","authenticated-orcid":false,"given":"Ozlem Durmaz","family":"Incel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"unstructured":"Accelerometer and gyroscopes sensors: operation, sensing, and applications. https:\/\/pdfserv.maximintegrated.com\/en\/an\/AN5830.pdf","key":"3_CR1"},{"unstructured":"Crowdsignals platform, description of sensor data types collected, user\u2019s reference document. http:\/\/crowdsignals.io\/docs\/AlgoSnap%20Sensor%20Data%20Types%20Description.pdf","key":"3_CR2"},{"unstructured":"Crowdsignals.io. http:\/\/crowdsignals.io\/","key":"3_CR3"},{"unstructured":"Data in h2o.ai. http:\/\/docs.h2o.ai\/h2o\/latest-stable\/h2o-py\/docs\/data.html","key":"3_CR4"},{"unstructured":"H2o.ai distributed random forest. http:\/\/docs.h2o.ai\/h2o\/latest-stable\/h2o-docs\/data-science\/drf.html","key":"3_CR5"},{"unstructured":"H2o.ai generalized linear model (GLM). http:\/\/docs.h2o.ai\/h2o\/latest-stable\/h2o-docs\/data-science\/glm.html","key":"3_CR6"},{"unstructured":"H2o.ai gradient boosting machine (GBM). http:\/\/docs.h2o.ai\/h2o\/latest-stable\/h2o-docs\/data-science\/gbm.html","key":"3_CR7"},{"unstructured":"H2o.ai machine learning platform. https:\/\/h2o-release.s3.amazonaws.com\/h2o\/rel-slater\/9\/docs-website\/h2o-py\/docs\/index.html","key":"3_CR8"},{"unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. CoRR abs\/1408.1416 (2014)","key":"3_CR9"},{"doi-asserted-by":"crossref","unstructured":"Das, A., Borisov, N., Caesar, M.: Tracking mobile web users through motion sensors: attacks and defenses. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, 21\u201324 February 2016. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/tracking-mobile-web-users-through-motion-sensors-attacks-defenses.pdf","key":"3_CR10","DOI":"10.14722\/ndss.2016.23390"},{"doi-asserted-by":"crossref","unstructured":"Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: AccelPrint: imperfections of accelerometers make smartphones trackable. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23\u201326 February 2014. https:\/\/www.ndss-symposium.org\/ndss2014\/accelprint-imperfections-accelerometers-make-smartphones-trackable","key":"3_CR11","DOI":"10.14722\/ndss.2014.23059"},{"issue":"9","key":"3_CR12","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.3390\/s17092043","volume":"17","author":"Muhammad Ehatisham-ul-Haq","year":"2017","unstructured":"Ehatisham-ul Haq, M., et al.: Authentication of smartphone users based on activity recognition and mobile sensing. Sensors 17(9) (2017). https:\/\/doi.org\/10.3390\/s17092043. https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2043","journal-title":"Sensors"},{"doi-asserted-by":"publisher","unstructured":"Lee, W., Lee, R.B.: Sensor-based implicit authentication of smartphone users. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 309\u2013320, June 2017. https:\/\/doi.org\/10.1109\/DSN.2017.21","key":"3_CR13","DOI":"10.1109\/DSN.2017.21"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144\u2013161. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72037-9_9"},{"doi-asserted-by":"publisher","unstructured":"Welbourne, E., Munguia Tapia, E.: CrowdSignals: a call to crowdfund the community\u2019s largest mobile dataset, pp. 873\u2013877, September 2014. https:\/\/doi.org\/10.1145\/2638728.2641309","key":"3_CR15","DOI":"10.1145\/2638728.2641309"}],"container-title":["Communications in Computer and Information Science","Big Data Innovations and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27355-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:40:39Z","timestamp":1709822439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-27355-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030273545","9783030273552"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27355-2_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Innovate-Data","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Innovations and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turkey","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"innovatedata2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ficloud.org\/innovate-data-2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}