{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:25:13Z","timestamp":1740806713985,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_7","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"76-95","source":"Crossref","is-referenced-by-count":8,"title":["User Tracking Based on Behavioral Fingerprints"],"prefix":"10.1007","author":[{"given":"G\u00fcnther","family":"Lackner","sequence":"first","affiliation":[]},{"given":"Peter","family":"Teufl","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Weinberger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Berger, H., Dittenbach, M., Merkl, D.: An adaptive information retrieval system based on associative networks (2004)","DOI":"10.1007\/978-3-7091-0594-8_21"},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1145\/584792.584888","volume-title":"Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002","author":"D. Barbar\u00e1","year":"2002","unstructured":"Barbar\u00e1, D., Li, Y., Couto, J.: Coolcat: an entropy-based algorithm for categorical clustering. In: Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002, pp. 582\u2013589. ACM, New York (2002)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11552253_5","volume-title":"Advances in Intelligent Data Analysis VI","author":"J. Couto","year":"2005","unstructured":"Couto, J.: Kernel k-means for categorical data. In: Famili, A.F., Kok, J.N., Pe\u00f1a, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol.\u00a03646, pp. 46\u201356. Springer, Heidelberg (2005)"},{"key":"7_CR4","unstructured":"Crestani, F.: Application of spreading activation techniques in information retrieval (1997)"},{"key":"7_CR5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1352533.1352542","volume-title":"Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008","author":"L.C.C. Desmond","year":"2008","unstructured":"Desmond, L.C.C., Yuan, C.C., Pheng, T.C., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, pp. 46\u201355. ACM, New York (2008)"},{"key":"7_CR6","unstructured":"Eagle, N., Pentland, A.S.: Eigenbehaviors: identifying structure in routine. Social Networks: New Perspectives (2007)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Fellbaum, C.: Wordnet: An electronic lexical database (language, speech, and communication). Hardcover (May 1998)","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"7_CR8","unstructured":"McCoy, D., Van Randwyk, J., Tabriz, P., Sicker, D., Neagoe, V., Franklin, J.: Passive data link layer 802.11 wireless device driver fingerprinting (2006)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Guenther, A., Hoene, C.: Measuring round trip times to determine the distance between wlan nodes. Technical report, Telecommunication Networks Group, TU-Berlin, Germans (2005)","DOI":"10.1007\/11422778_62"},{"key":"7_CR10","unstructured":"Hall, J., Barbeau, M., Kranakis, E.: Radio frequency fingerprinting for intrusion detection in wireless networks. In: IEEE Transactions On Dependable And Secure Computing (2006)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kozima, H., Ito, A.: Context-sensitive measurement of word distance by adaptive scaling of a semantic space. volume cmp-lg\/9601007 (1996)","DOI":"10.1075\/cilt.136.12koz"},{"key":"7_CR12","series-title":"Springer Series in Information Sciences","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-Organizing Maps. Springer Series in Information Sciences, vol.\u00a030. Springer, Berlin (1995)"},{"key":"7_CR13","series-title":"Springer Series in Information Sciences","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-organizing maps","author":"T. Kohonen","year":"2001","unstructured":"Kohonen, T.: Self-organizing maps. Springer Series in Information Sciences, vol.\u00a030. Springer, Heidelberg (2001)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kozima, H.: Similarity between words computed by spreading activation on an english dictionary. In: EACL, pp. 232\u2013239 (1993)","DOI":"10.3115\/976744.976772"},{"key":"7_CR15","unstructured":"Lackner, G., Lamberger, M., Payer, U., Teufl, P.: Wifi fingerprinting. In: DACH Mobility 2006 (September 2006)"},{"key":"7_CR16","first-page":"65","volume-title":"Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2007","author":"Z. Liu","year":"2007","unstructured":"Liu, Z., Peng, D.: User behavior identification for trust management in pervasive computing systems. In: Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2007, Washington, DC, USA, pp. 65\u201372. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"7_CR17","first-page":"397","volume-title":"Artificial Neural Networks","author":"T. Martinetz","year":"1991","unstructured":"Martinetz, T., Schulten, K.: A \u201dneural gas\u201d network learns topologies. In: Kohonen, T., M\u00e4kisara, K., Simula, O., Kangas, J. (eds.) Artificial Neural Networks, pp. 397\u2013402. Elsevier, Amsterdam (1991)"},{"key":"7_CR18","first-page":"99","volume-title":"Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, MobiCom 2007","author":"J. Pang","year":"2007","unstructured":"Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, MobiCom 2007, pp. 99\u2013110. ACM, New York (2007)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Plummer, D.C.: Rfc 862 - an ethernet address resolution protocol or converting network protocol addresses to 48.bit ethernet address for transmission on ethernet hardware (1982)","DOI":"10.17487\/rfc0826"},{"issue":"8-9","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/S0893-6080(04)00166-2","volume":"17","author":"A.K. Qin","year":"2004","unstructured":"Qin, A.K., Suganthan, P.N.: Robust growing neural gas algorithm with application in cluster analysis. Neural Netw.\u00a017(8-9), 1135\u20131148 (2004)","journal-title":"Neural Netw."},{"key":"7_CR21","unstructured":"Quillian, M.R.: Semantic memory (1968)"},{"key":"7_CR22","volume-title":"Stochastic Complexity in Statistical Inquiry Theory","author":"J. Rissanen","year":"1989","unstructured":"Rissanen, J.: Stochastic Complexity in Statistical Inquiry Theory. World Scientific Publishing Co., Inc., River Edge (1989)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Sieka, B.: Active fingerprinting of 802.11 devices by timing analysis. In: 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006. vol.\u00a01, pp. 15\u201319 (January 2006)","DOI":"10.1109\/CCNC.2006.1592979"},{"key":"7_CR24","unstructured":"Teufl, P., Lackner, G.: Rdf data analysis with activation patterns. In: Proceedings of the 10th International Conference on Knowledge Management and Knowledge Technologies (i-KNOW 2010), Graz, Austria (September 2010)"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-14706-7_20","volume-title":"Computer Network Security","author":"P. Teufl","year":"2010","unstructured":"Teufl, P., Lackner, G., Payer, U.: From NLP (natural language processing) to MLP (machine language processing). In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol.\u00a06258, pp. 256\u2013269. Springer, Heidelberg (2010)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Teufl, P., Payer, U., Fellner, R.: Event correlation on the basis of activation patterns (2010)","DOI":"10.1109\/PDP.2010.80"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Teufl, P., Payer, U., Parycek, P.: Automated analysis of e-participation data by utilizing associative networks, spreading activation and unsupervised learning. pp. 139\u2013150 (2009)","DOI":"10.1007\/978-3-642-03781-8_13"},{"key":"7_CR28","unstructured":"Tsatsaronis, G., Vazirgiannis, M., Androutsopoulos, I.: Word sense disambiguation with spreading activation networks generated from thesauri (January 2007)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T09:14:27Z","timestamp":1740734067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}