{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:29:17Z","timestamp":1768015757108,"version":"3.49.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319155081","type":"print"},{"value":"9783319155098","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_5","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"57-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic"],"prefix":"10.1007","author":[{"given":"Stanislav","family":"Miskovic","sequence":"first","affiliation":[]},{"given":"Gene Moo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Baldi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"5_CR1","unstructured":"Apsalar: Data-Powered Mobile Advertising. http:\/\/apsalar.com\/"},{"key":"5_CR2","unstructured":"Choi, Y., Chung, J.Y., Park, B., Hong, J.W.K.: Automated classifier generation for application-level mobile traffic identification. In: Proceedings of Network Operations and Management Symposium (NOMS) (2012)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Dai, S., Tongaonkar, A., Wang, X., Nucci, A., Song, D.: NetworkProfiler: towards automatic fingerprinting of Android apps. In: INFOCOM. Turin, Italy, April 2013","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Falaki, H., Lymberopoulos, D., Mahajan, R., Kandula, S., Estrin, D.: A first look at traffic on smartphones. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC 2010, pp. 281\u2013287. ACM, New York (2010)","DOI":"10.1145\/1879141.1879176"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys 2010, pp. 179\u2013194. ACM, New York (2010)","DOI":"10.1145\/1814433.1814453"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-642-19260-9_18","volume-title":"Passive and Active Measurement","author":"A Gember","year":"2011","unstructured":"Gember, A., Anand, A., Akella, A.: A comparative study of handheld and non-handheld traffic in campus Wi-Fi networks. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 173\u2013183. Springer, Heidelberg (2011)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Leontiadis, I., Efstratiou, C., Picone, M., Mascolo, C.: Don\u2019t kill my ads!: Balancing privacy in an ad-supported mobile application market. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile 2012, pp. 2:1\u20132:6. ACM, New York (2012)","DOI":"10.1145\/2162081.2162084"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-12334-4_17","volume-title":"Passive and Active Measurement","author":"G Maier","year":"2010","unstructured":"Maier, G., Schneider, F., Feldmann, A.: A first look at mobile hand-held device traffic. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol. 6032, pp. 161\u2013170. Springer, Heidelberg (2010)"},{"key":"5_CR9","unstructured":"Mobile App Usage Further Dominates Web. http:\/\/www.flurry.com\/bid\/80241\/Mobile-App-Usage-Further-Dominates-Web-Spurred-by-Facebook#.VAZhp9-c3PE"},{"key":"5_CR10","unstructured":"Moore, D., Keys, K., Koga, R., Lagache, E., Claffy, K.C.: The coralreef software suite as a tool for system and network administrators. In: Proceedings of the 15th USENIX Conference on System Administration, LISA 2001, pp. 133\u2013144. USENIX Association, Berkeley (2001)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 209\u2013220 (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"5_CR12","unstructured":"UI\/Application Exerciser Monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: ProfileDroid: multi-layer profiling of android applications. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Mobicom 2012, pp. 137\u2013148. ACM, New York (2012)","DOI":"10.1145\/2348543.2348563"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Xu, Q., Erman, J., Gerber, A., Mao, Z., Pang, J., Venkataraman, S.: Identifying diverse usage behaviors of smartphone apps. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 329\u2013344. ACM, New York (2011)","DOI":"10.1145\/2068816.2068847"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:09:30Z","timestamp":1676441370000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}