{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:57:51Z","timestamp":1772906271771,"version":"3.50.1"},"reference-count":146,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000853","name":"University of Glasgow","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000853","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA \u2212 390781972"],"award-info":[{"award-number":["EXC 2092 CASA \u2212 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,1,17]]},"DOI":"10.1080\/10447318.2024.2361519","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T12:44:30Z","timestamp":1718196270000},"page":"1628-1651","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["A Systematic Deconstruction of Human-Centric Privacy &amp; Security Threats on Mobile Phones"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2961-3500","authenticated-orcid":false,"given":"Habiba","family":"Farzand","sequence":"first","affiliation":[{"name":"University of Glasgow","place":["Scotland, UK"]}]},{"given":"Melvin","family":"Abraham","sequence":"additional","affiliation":[{"name":"University of Glasgow","place":["Scotland, UK"]}]},{"given":"Stephen","family":"Brewster","sequence":"additional","affiliation":[{"name":"University of Glasgow","place":["Scotland, UK"]}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow","place":["Scotland, UK"]}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum","place":["Germany"]}]}],"member":"301","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"key":"e_1_3_3_2_1","unstructured":"62443 I. (2022). Iec 62443. Retrieved from https:\/\/en.wikipedia.org\/wiki\/IEC_62443"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531106"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019919411"},{"key":"e_1_3_3_6_1","unstructured":"Alliance I. G. C. (2020). Quick start guide: An overview of isa\/iec 62443 standards security of industrial automation and control systems. https:\/\/gca.isa.org\/hubfs\/ISAGCA%20Quick%20Start%20Guide%20FINAL.pdf"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563693"},{"key":"e_1_3_3_8_1","unstructured":"Amazon (2022). Amazon alexa. Retrieved February 20 2022 from https:\/\/developer.amazon.com\/en-US\/alexa"},{"key":"e_1_3_3_9_1","unstructured":"Amazon (2023). Amazon listing - PerfectPrime IR203 (IR) Infrared Thermal Imager Camera. Retrieved January 1 2023 from https:\/\/amzn.to\/3H22Nod"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"key":"e_1_3_3_12_1","unstructured":"Android (2022). Android ndk. Retrieved February 20 2022 from https:\/\/developer.android.com\/ndk"},{"key":"e_1_3_3_13_1","unstructured":"Apple (2022). Apple siri. Retrieved February 20 2022 from https:\/\/www.apple.com\/siri\/"},{"key":"e_1_3_3_14_1","unstructured":"At Waikato University M. L. (2021). Weka 3 - data mining with open source machine learning software in java. Retrieved February 20 2022 from https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054863"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052989"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.005"},{"key":"e_1_3_3_20_1","unstructured":"Chang C.-C. Lin C.-J. (2021). Libsvm. Retrieved February 20 2022 from https:\/\/www.csie.ntu.edu.tw\/\u223ccjlin\/libsvm\/"},{"key":"e_1_3_3_21_1","unstructured":"Chen Q. A. Qian Z. Mao Z. M. (2014). Peeking into your app without actually seeing it:{UI} state inference and novel android attacks. In 23rd Usenix Security Symposium (Usenix Security 14) (pp. 1037\u20131052)."},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2956035"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0606"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.61"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"e_1_3_3_26_1","unstructured":"Committee I. & (TC65WG10) I. T. C. W. G. (2016). The 62443 series of standards: Industrial automation and control systems security."},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469845"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_33_1","unstructured":"Ettus. (2022). Usrp b210. Retrieved February 20 2022 from https:\/\/www.ettus.com\/all-products\/ub210-kit\/"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554211"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642623"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2022.23015"},{"key":"e_1_3_3_38_1","volume-title":"Phishing on mobile devices","author":"Felt A. P.","year":"2011","unstructured":"Felt, A. P., & Wagner, D. (2011). Phishing on mobile devices. Citeseer."},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_3_40_1","unstructured":"Fernandes E. Chen Q. A. Essl G. Halderman J. A. Mao Z. M. & Prakash A. (2014). Tivos: Trusted visual i\/o paths for android. University of Michigan CSE Technical Report CSE-TR-586-14"},{"key":"e_1_3_3_41_1","unstructured":"for Developers A. (2022). Permissions on android. Retrieved February 20 2022 from https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00022"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2021.114085"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.12.006"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_3_46_1","unstructured":"Google (2022). Google assistant. Retrieved February 20 2022 from https:\/\/assistant.google.com\/"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70116-6"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102110"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2343154"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_6"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785834"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329804"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_12"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41483-6_1"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813778"},{"key":"e_1_3_3_56_1","doi-asserted-by":"crossref","unstructured":"Hanna S. Huang L. Wu E. Li S. Chen C. Song D. (2012). Juxtapp: A scalable system for detecting code reuse among android applications. In International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (pp. 62\u201381).","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_3_57_1","unstructured":"Harbach M. Von Zezschwitz E. Fichtner A. De Luca A. Smith M. (2014). {It\u2019s} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception. In 10th Symposium on Usable Privacy and Security (Soups 2014) (pp. 213\u2013230)."},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2015.7320048"},{"key":"e_1_3_3_60_1","doi-asserted-by":"crossref","unstructured":"Ho T. K. (1995). Random decision forests. In Proceedings of 3rd International Conference on Document Analysis and Recognition (Vol. 1 pp. 278\u2013282).","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"e_1_3_3_61_1","doi-asserted-by":"crossref","unstructured":"H\u00f6lzl M. Roland M. & Mayrhofer R. (2017). Real-world identification for an extensible and privacy-preserving mobile eid [Paper presentation]. In IFIP International Summer School on Privacy and Identity Management (pp. 354\u2013370).","DOI":"10.1007\/978-3-319-92925-5_24"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611489"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.907464"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053028"},{"key":"e_1_3_3_65_1","unstructured":"Ivaturi K. Janczewski L. (2011). A taxonomy for social engineering attacks. In International Conference on Information Resources Management (pp. 1\u201312)."},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_3_67_1","unstructured":"Jia J. Gong N. Z. (2018). {AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning. In 27th Usenix Security Symposium (Usenix Security 18) (pp. 513\u2013529)."},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_15"},{"key":"e_1_3_3_69_1","unstructured":"Johnson A. (2021). Side channel attacks and mitigations 2015-2020: A taxonomy of published work [Paper presentation]. In European Conference on Cyber Warfare and Security (pp. 482\u2013XII)."},{"issue":"4","key":"e_1_3_3_70_1","first-page":"54","article-title":"Side channel attack-survey","volume":"1","author":"Joy Persial G.","year":"2011","unstructured":"Joy Persial, G., Prabhu, M., & Shanmugalakshmi, R. (2011). Side channel attack-survey. International Journal of Advance Scientific Research Review, 1(4), 54\u201357.","journal-title":"International Journal of Advance Scientific Research Review"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.239"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.3390\/mti2030045"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3568450"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_3_76_1","unstructured":"Krombholz K. Hupperich T. Holz T. (2016). Use the force: Evaluating {Force-Sensitive} authentication for mobile devices. In Twelfth Symposium on Usable Privacy and Security (Soups 2016) (pp. 207\u2013219)."},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918647"},{"key":"e_1_3_3_78_1","unstructured":"Kumar R. Kishore S. Lu H. Prakash A. (2020). Security analysis of unified payments interface and payment apps in India. In 29th Usenix Security Symposium (Usenix Security 20) (pp. 1499\u20131516)."},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"e_1_3_3_80_1","unstructured":"Lakshmanan N. Budhdev N. Kang M. S. Chan M. C. & Han J. (2021). A stealthy location identification attack exploiting carrier aggregation in cellular networks [Paper presentation]. In 30th Usenix Security Symposium (Usenix Security 21) (pp. 3899\u20133916)."},{"key":"e_1_3_3_81_1","unstructured":"Lee K. Kaiser B. Mayer J. Narayanan A. (2020). An empirical study of wireless carrier authentication for {SIM} swaps. In Sixteenth Symposium on Usable Privacy and Security (Soups 2020) (pp. 61\u201379)."},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00004"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464449"},{"key":"e_1_3_3_85_1","first-page":"549","volume-title":"25th Usenix Security Symposium (Usenix Security 16)","author":"Lipp M.","year":"2016","unstructured":"Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., Mangard, S. (2016). {ARMageddon}: Cache attacks on mobile devices. In 25th Usenix Security Symposium (Usenix Security 16) (pp. 549\u2013564)."},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053288"},{"key":"e_1_3_3_87_1","first-page":"227","volume-title":"International Symposium on Foundations and Practice of Security","author":"Luo T.","year":"2012","unstructured":"Luo, T., Jin, X., Ananthanarayanan, A., Du, W. (2012). Touchjacking attacks on web in android, IOS, and windows phone. In International Symposium on Foundations and Practice of Security (pp. 227\u2013243)."},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_3_89_1","first-page":"5235","volume-title":"32nd Usenix Security Symposium (Usenix Security 23","author":"Marky K.","year":"2023","unstructured":"Marky, K., Macdonald, S., Abdrabou, Y., Khamis, M. (2023). In the quest to protect users from {Side-Channel} attacks\u2013a {User-Centred} design space to mitigate thermal attacks on public payment terminals. In 32nd Usenix Security Symposium (Usenix Security 23) (pp. 5235\u20135252)."},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1999.0831"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358650"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477601"},{"issue":"2","key":"e_1_3_3_93_1","first-page":"159","article-title":"Qualitative content analysis","volume":"1","author":"Mayring P.","year":"2004","unstructured":"Mayring, P., et\u00a0al. (2004). Qualitative content analysis. A Companion to Qualitative Research, 1(2), 159\u2013176.","journal-title":"A Companion to Qualitative Research,"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732205"},{"key":"e_1_3_3_95_1","volume-title":"Proceedings of the Usenix Security Symposium","volume":"1","author":"Mitchell M.","year":"2015","unstructured":"Mitchell, M., Wang, A.-I., Reiher, P. (2015). Cashtags: Prevent leaking sensitive information through screen display. In Proceedings of the Usenix Security Symposium (Vol. 1)."},{"key":"e_1_3_3_96_1","first-page":"1","volume-title":"Symposium on Requirements Engineering for Information Security (Sreis)","volume":"2005","author":"Myagmar S.","year":"2005","unstructured":"Myagmar, S., Lee, A. J., Yurcik, W. (2005). Threat modeling as a basis for security requirements. In Symposium on Requirements Engineering for Information Security (Sreis) (Vol. 2005, pp. 1\u20138)."},{"key":"e_1_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627417"},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_3_99_1","volume-title":"Ui redressing attacks on android devices","author":"Niemietz M.","year":"2012","unstructured":"Niemietz, M., & Schwenk, J. (2012). Ui redressing attacks on android devices. Black Hat Abu Dhabi."},{"key":"e_1_3_3_100_1","unstructured":"Ocr T. (2022). Tesseract ocr. Retrieved February 20 2022 from https:\/\/github.com\/tesseract-ocr\/tesseract"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2665640"},{"key":"e_1_3_3_102_1","unstructured":"OpenCV (2022a). Eroding and dilating. Retrieved February 20 2022 from https:\/\/docs.opencv.org\/2.4\/doc\/tutorials\/imgproc\/erosion_dilatation\/erosion_dilatation.html"},{"key":"e_1_3_3_103_1","unstructured":"OpenCV (2022b). Opencv. Retrieved February 20 2022 from https:\/\/opencv.org"},{"key":"e_1_3_3_104_1","unstructured":"OpenCV (2022c). Opencv: Canny edge detection. Retrieved February 20 2022 from https:\/\/docs.opencv.org\/3.4\/da\/d22\/tutorial_py_canny.html"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_3_106_1","first-page":"711","volume-title":"28th Usenix Security Symposium (Usenix Security 19)","author":"Pham A.","year":"2019","unstructured":"Pham, A., Dacosta, I., Losiouk, E., Stephan, J., Huguenin, K., Hubaux, J.-P. (2019). {HideMyApp}: Hiding the presence of sensitive apps on android. In 28th Usenix Security Symposium (Usenix Security 19) (pp. 711\u2013728)."},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766511"},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3373662"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243785"},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_3_111_1","doi-asserted-by":"crossref","unstructured":"Rescorla E. & Korver B. (2003). Guidelines for writing rfc text on security considerations (Tech. Rep.). BCP 72 RFC 3552 July.","DOI":"10.17487\/rfc3552"},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472058"},{"key":"e_1_3_3_113_1","unstructured":"Security H. (2022). Android permissions can be dangerous: Full guide to managing them. Retrieved February 20 2022 from https:\/\/heimdalsecurity.com\/blog\/android-permissions-full-guide\/"},{"key":"e_1_3_3_114_1","unstructured":"Security N. E. (2022). Uniqpass v15 \u2013 large password list. Retrieved February 20 2022 from https:\/\/neverendingsecurity.wordpress.com\/2015\/04\/19\/uniqpass-v15-large-password-list\/"},{"key":"e_1_3_3_115_1","first-page":"99","volume-title":"International Conference on Information Security","author":"Shi E.","year":"2010","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R. (2010). Implicit authentication through learning user behavior. In International Conference on Information Security (pp. 99\u2013113)."},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00540-z"},{"key":"e_1_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911171"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0020"},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"e_1_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196510"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212506"},{"key":"e_1_3_3_126_1","unstructured":"srsRAN (2022). Srsran - your own mobile network. Retrieved February 20 2022 from https:\/\/www.srslte.com"},{"key":"e_1_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4627108"},{"key":"e_1_3_3_128_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00024-0_15"},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098246"},{"key":"e_1_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.300"},{"key":"e_1_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2217608"},{"key":"e_1_3_3_132_1","volume-title":"9th Usenix Workshop on Offensive Technologies (Woot 15)","author":"Watanabe T.","year":"2015","unstructured":"Watanabe, T., Akiyama, M., & Mori, T. (2015). {RouteDetector}: Sensor-based positioning system that exploits {Spatio-Temporal} regularity of human mobility [Paper presentation]. In 9th Usenix Workshop on Offensive Technologies (Woot 15)."},{"key":"e_1_3_3_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761435"},{"key":"e_1_3_3_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875934"},{"key":"e_1_3_3_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.007"},{"key":"e_1_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23130"},{"key":"e_1_3_3_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.006"},{"key":"e_1_3_3_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"e_1_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.017"},{"key":"e_1_3_3_140_1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8793025"},{"key":"e_1_3_3_141_1","article-title":"Truspy: Cache side-channel information leakage from the secure world on arm devices","author":"Zhang N.","year":"2016","unstructured":"Zhang, N., Sun, K., Shands, D., Lou, W., & Hou, Y. T. (2016). Truspy: Cache side-channel information leakage from the secure world on arm devices. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2016\/980","journal-title":"Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2016\/980"},{"key":"e_1_3_3_142_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security","author":"Zhang X.","year":"2018","unstructured":"Zhang, X., Wang, X., Bai, X., Zhang, Y., Wang, X. (2018). Os-level side channels without procfs: Exploring cross-app information leakage on ios. In Proceedings of the Symposium on Network and Distributed System Security."},{"key":"e_1_3_3_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978360"},{"key":"e_1_3_3_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2944034"},{"key":"e_1_3_3_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_3_3_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_3_147_1","unstructured":"Zisserman A. (2015). The svm classifier. Retrieved February 20 2022 from https:\/\/www.robots.ox.ac.uk\/\u223caz\/lectures\/ml\/lect2.pdf"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2361519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T03:47:02Z","timestamp":1739245622000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2361519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":146,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,1,17]]}},"alternative-id":["10.1080\/10447318.2024.2361519"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2361519","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-01-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-08","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}