{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:49:38Z","timestamp":1772909378795,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030629731","type":"print"},{"value":"9783030629748","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62974-8_22","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T13:10:38Z","timestamp":1606223438000},"page":"393-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1600-835X","authenticated-orcid":false,"given":"Pier Paolo","family":"Tricomi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-25446-8_4","volume-title":"Human Behavior Understanding","author":"M Baccouche","year":"2011","unstructured":"Baccouche, M., Mamalet, F., Wolf, C., Garcia, C., Baskurt, A.: Sequential deep learning for human action recognition. In: Salah, A.A., Lepri, B. (eds.) HBU 2011. LNCS, vol. 7065, pp. 29\u201339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25446-8_4"},{"key":"22_CR2","unstructured":"Blog, A.: League of legends gamers targeted by phishing scam | avast (2018). https:\/\/securityboulevard.com\/2018\/10\/league-of-legends-gamers-targeted-by-phishing-scam-avast\/. Accessed 8 Mar 2020"},{"key":"22_CR3","unstructured":"Chung, E.: Playstation data breach deemed in \u2018top 5 ever\u2019. CBC News (2011)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Conti, M., Nati, M., Rotundo, E., Spolaor, R.: Mind the plug! laptop-user recognition through power consumption. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 37\u201344 (2016)","DOI":"10.1145\/2899007.2899009"},{"key":"22_CR5","unstructured":"D\u2019anastasio, C.: What\u2019s really going on with all those hacked fortnite accounts (2018). https:\/\/kotaku.com\/whats-really-going-on-with-all-those-hacked-fortnite-ac-1823965781. Accessed 10 March 2020"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Deng, L., Hinton, G., Kingsbury, B.: New types of deep neural network learning for speech recognition and related applications: an overview. In: 2013 IEEE ICASSP, pp. 8599\u20138603. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Drachen, A., Canossa, A., Yannakakis, G.N.: Player modeling using self-organization in tomb raider: underworld. In: 2009 IEEE Symposium on Computational Intelligence and Games, pp. 1\u20138 (2009)","DOI":"10.1109\/CIG.2009.5286500"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Eggert, C., Herrlich, M., Smeddinck, J., Malaka, R.: Classification of player roles in the team-based multi-player game dota 2, pp. 112\u2013125 (2015)","DOI":"10.1007\/978-3-319-24589-8_9"},{"issue":"1","key":"22_CR9","first-page":"4","volume":"8","author":"M Fryling","year":"2015","unstructured":"Fryling, M., Cotler, J.L., Rivituso, J., Mathews, L., Pratico, S.: Cyberbullying or normal game play? impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum. J. Inf. Syst. Appl. Res. 8(1), 4 (2015)","journal-title":"J. Inf. Syst. Appl. Res."},{"issue":"1","key":"22_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.adolescence.2003.10.005","volume":"27","author":"JB Funk","year":"2004","unstructured":"Funk, J.B., Baldacci, H.B., Pasold, T., Baumgardner, J.: Violence exposure in real-life, video games, television, movies, and the internet: is there desensitization? J. Adolescence 27(1), 23\u201339 (2004)","journal-title":"J. Adolescence"},{"key":"22_CR11","unstructured":"Gaimin.io, A.: How many gamers are there? July 2018. https:\/\/gaimin.io\/how-many-gamers-are-there\/. Accessed 7 2020"},{"key":"22_CR12","unstructured":"Gao, L., Judd, J., Wong, D., Lowder, J.: Classifying dota 2 hero characters based on play style and performance. University of Utah Course on ML (2013)"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"9763","DOI":"10.1038\/srep09763","volume":"5","author":"D Gong","year":"2015","unstructured":"Gong, D., et al.: Enhanced functional connectivity and increased gray matter volume of insula related to action video game playing. Sci. Rep. 5, 9763 (2015)","journal-title":"Sci. Rep."},{"issue":"1","key":"22_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1037\/a0034857","volume":"69","author":"I Granic","year":"2014","unstructured":"Granic, I., Lobel, A., Engels, R.C.: The benefits of playing video games. Am. psychol. 69(1), 66 (2014)","journal-title":"Am. psychol."},{"key":"22_CR15","unstructured":"Jedrzejczyk, L., Price, B.A., Bandara, A.K., Nuseibeh, B., Hall, W., Keynes, M.: I know what you did last summer: risks of location data leakage in mobile and social computing, pp. 1744\u20131986. Department of Computing Faculty of Mathematics, Computing and Technology The Open University (2009)"},{"key":"22_CR16","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"3","key":"22_CR17","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s00127-016-1179-6","volume":"51","author":"V Kovess-Masfety","year":"2016","unstructured":"Kovess-Masfety, V., et al.: Is time spent playing video games associated with mental health, cognitive and social skills in young children? Social Psychiatry Psychiatric Epidemiol. 51(3), 349\u2013357 (2016). https:\/\/doi.org\/10.1007\/s00127-016-1179-6","journal-title":"Social Psychiatry Psychiatric Epidemiol."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Mahlmann, T., Drachen, A., Togelius, J., Canossa, A., Yannakakis, G.N.: Predicting player behavior in tomb raider: Underworld. In: Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, pp. 178\u2013185, August 2010","DOI":"10.1109\/ITW.2010.5593355"},{"key":"22_CR19","unstructured":"McDonald, E.: ACI and newzoo whitepaper: turning players into payers | understanding the gaming payments experience. https:\/\/newzoo.com\/insights\/articles\/aci-and-newzoo-whitepaper-turning-players-into-payers\/ (2018). Accessed 8 March 2020"},{"key":"22_CR20","unstructured":"M\u00fcller, S., et al.: Statistical analysis of player behavior in minecraft. In: Proceedings of the 10th International Conference on the Foundations of Digital Games. Society for the Advancement of the Science of Digital Games (2015)"},{"key":"22_CR21","first-page":"527","volume":"42","author":"J Newman","year":"2014","unstructured":"Newman, J., Jerome, J.: Press start to track privacy and the new questions posed by modern video game technology. AIPLA QJ 42, 527 (2014)","journal-title":"AIPLA QJ"},{"key":"22_CR22","unstructured":"OpenAI, Berner, C., et al.: Dota 2 with large scale deep reinforcement learning (2019). https:\/\/arxiv.org\/abs\/1912.06680"},{"key":"22_CR23","unstructured":"Reimers, N., Gurevych, I.: Optimal hyperparameters for deep lstm-networks for sequence labeling tasks. arXiv preprint arXiv:1707.06799 (2017)"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Russell, N.C., Reidenberg, J.R., Moon, S.: Privacy in gaming. Fordham Intell. Prop. Media & Ent. LJ 29, 61 (2018)","DOI":"10.2139\/ssrn.3147068"},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1177\/003172170508700205","volume":"87","author":"DW Shaffer","year":"2005","unstructured":"Shaffer, D.W., Squire, K.R., Halverson, R., Gee, J.P.: Video games and the future of learning. Phi Delta Kappan 87(2), 105\u2013111 (2005)","journal-title":"Phi Delta Kappan"},{"key":"22_CR26","unstructured":"Statista.com: Facebook\u2019s annual revenue from 2009 to 2019 (2020). https:\/\/www.statista.com\/statistics\/268604\/annual-revenue-of-facebook\/. Accessed 4 March 2020"},{"key":"22_CR27","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, pp. 3104\u20133112 (2014)"},{"key":"22_CR28","unstructured":"Team, D.: Matchmaking update for the next ranked season, September 2019. http:\/\/blog.dota2.com\/2019\/09\/matchmaking-update-for-the-next-ranked-season\/. Accessed 6 March 2020"},{"key":"22_CR29","unstructured":"Valve: Security and trading. https:\/\/store.steampowered.com\/news\/19618\/ (2015). Accessed 11 March 2020"},{"key":"22_CR30","unstructured":"Wilson, J.: Newzoo: U.S. will overtake china as no. 1 gaming market in 2019 (2019). https:\/\/venturebeat.com\/2019\/06\/18\/newzoo-u-s-will-overtake-china-as-no-1-gaming-market-in-2019\/. Accessed 9 March 2020"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62974-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:12:48Z","timestamp":1607299968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62974-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030629731","9783030629748"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62974-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2020.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}