{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:37:04Z","timestamp":1774190224256,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/comsnets.2012.6151322","type":"proceedings-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T10:20:00Z","timestamp":1329301200000},"page":"1-10","source":"Crossref","is-referenced-by-count":29,"title":["Control and understanding: Owning your home network"],"prefix":"10.1109","author":[{"given":"R.","family":"Mortier","sequence":"first","affiliation":[]},{"given":"T.","family":"Rodden","sequence":"additional","affiliation":[]},{"given":"T.","family":"Lodge","sequence":"additional","affiliation":[]},{"given":"D.","family":"McAuley","sequence":"additional","affiliation":[]},{"given":"C.","family":"Rotsos","sequence":"additional","affiliation":[]},{"given":"A.W.","family":"Moore","sequence":"additional","affiliation":[]},{"given":"A.","family":"Koliousis","sequence":"additional","affiliation":[]},{"given":"J.","family":"Sventek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Designing interactive home network maintenance tools","author":"shehan-poole","year":"2008","journal-title":"Proc ACM DIS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2018602.2018604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990667"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018523"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref15","article-title":"The CQL continuous query language: semantic foundations and query execution","volume":"15","author":"arasu","year":"2005","journal-title":"The VLDB Journal"},{"key":"ref16","article-title":"Dynamic Host Configuration Protocol","author":"droms","year":"1997","journal-title":"RFC 2131 IETF"},{"key":"ref17","article-title":"Extensible Authentication Protocol (EAP)","author":"aboba","year":"2004","journal-title":"IETF RFC 3748"},{"key":"ref18","article-title":"Moving toward the middle: The case against the end-to-end argument in home networking","author":"calvert","year":"2007","journal-title":"Proc HOTNETS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/571985.572007"},{"key":"ref28","article-title":"Internet subnets","author":"mogul","year":"1984","journal-title":"IETF RFC 917"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013127"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402973"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1023\/B:COSU.0000045712.26840.a4","article-title":"Domestic routines and design for the home","volume":"13","author":"rodden","year":"2004","journal-title":"Computer Supported Cooperative Work The Journal of Collaborative Computing"},{"key":"ref6","article-title":"Home networking and HCI: What hath God wrought?","author":"shehan","year":"2007","journal-title":"Proc ACM CHI"},{"key":"ref29","article-title":"Multi-LAN address resolution","author":"postel","year":"1984","journal-title":"IETF RFC 925"},{"key":"ref5","first-page":"208","article-title":"Finding a place for ubicomp in the home","author":"crabtree","year":"2003","journal-title":"Proc UbiComp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72727-9_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-031-5_18"},{"key":"ref20","article-title":"Network-in-a-box: how to set up a secure wireless network in under a minute","author":"balfanz","year":"2004","journal-title":"Proc the 13th USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74800-7_15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1851307.1851321"},{"key":"ref23","article-title":"HostView: Annotating end-host performance measurements with user feedback","author":"joumblatt","year":"2010","journal-title":"Proc ACM HotMetrics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"ref25","first-page":"257","article-title":"Re-claiming network-wide visibility using ubiquitous endsystem monitors","author":"cooke","year":"2006","journal-title":"Proc USENIX Annual Technical Conference"}],"event":{"name":"2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2012,1,3]]},"end":{"date-parts":[[2012,1,7]]}},"container-title":["2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6145051\/6151271\/06151322.pdf?arnumber=6151322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T10:17:11Z","timestamp":1497953831000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6151322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2012.6151322","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}