{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T23:15:06Z","timestamp":1777331706674,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/cits.2018.8440163","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T18:37:34Z","timestamp":1534790254000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["Browsers Fingerprinting Motives, Methods, and Countermeasures"],"prefix":"10.1109","author":[{"given":"Amr","family":"ElBanna","sequence":"first","affiliation":[]},{"given":"Nashwa","family":"Abdelbaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Adobe"},{"key":"ref11","year":"0","journal-title":"Microsoft"},{"key":"ref12","article-title":"The WebGL API: 2D and 3D graphics for the web","author":"hobson","year":"0","journal-title":"Mozilla &#x2014; MSDN web docs"},{"key":"ref13","article-title":"Pixel Perfect: Fingerprinting Canvas in HTML5","author":"mowery","year":"2012","journal-title":"Proc IEEE CS Security and Privacy Workshops"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-47854-7_7","article-title":"Fingerprinting Web Users Through Font Metrics","author":"fifield","year":"2015","journal-title":"Financial Cryptography and Data Security Springer"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.105"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-65188-0_6","article-title":"Practical Tools for Attackers & Defenders","author":"bhuyan","year":"2017","journal-title":"Network Traffic Anomaly Detection & Prevention"},{"key":"ref17","year":"2014","journal-title":"Get the Facts-Don't Get Scroogled!"},{"key":"ref18","author":"adstack","year":"2014","journal-title":"Email Optimization Platform"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390245"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266460"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-66399-9_2","article-title":"Quantifying Web Adblocker Privacy","author":"gervais","year":"2017","journal-title":"European Symposium on Research in Computer Security Computer Security-ESORICS 2017"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-64200-0_7","article-title":"Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability","author":"al-fannah","year":"2017","journal-title":"Advances in Information and Computer Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"ref29","year":"0","journal-title":"IETF RFC7230 DNT standard"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70010-6_61","article-title":"IPv6 OS Fingerprinting Methods: Review","author":"elejla","year":"2017","journal-title":"Advances in Visual Informatics"},{"key":"ref7","article-title":"Demonstrating a Simple Device Fingerprinting System","author":"rausch","year":"2014","journal-title":"Midwest instructions and computing symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity.2017.40"},{"key":"ref9","article-title":"Technical analysis of client identification mechanisms","author":"janc","year":"0","journal-title":"Chromium Security Google"},{"key":"ref1","article-title":"How unique is your web browser?","author":"eckersley","year":"2010","journal-title":"10th International Symposium PETS 2010"},{"key":"ref20","year":"2011","journal-title":"Credit card issuers watch online how you shop customize offers Creditcards"},{"key":"ref22","year":"2010","journal-title":"Insurers Test Data Profiles to Identify Risky Clients-WSJ"},{"key":"ref21","author":"economist","year":"2012","journal-title":"Insurance data Very personal finance"},{"key":"ref24","year":"2015","journal-title":"Pay Per Sale Affiliate Programs Affiliate Directory"},{"key":"ref23","year":"2013","journal-title":"Facebook friends could change your credit score"},{"key":"ref26","first-page":"31","article-title":"User Tracking on the Web via Cross-Browser Fingerprinting","author":"boda","year":"2011","journal-title":"Nordic Conference on Secure IT Systems Information Security Technology for Applications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.036"}],"event":{"name":"2018 International Conference on Computer, Information and Telecommunication Systems (CITS)","location":"Alsace, Colmar, France","start":{"date-parts":[[2018,7,11]]},"end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8419342\/8440125\/08440163.pdf?arnumber=8440163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:19:12Z","timestamp":1643192352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8440163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cits.2018.8440163","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}