{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:18Z","timestamp":1767340278178},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1109\/ecai58194.2023.10194205","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T13:33:22Z","timestamp":1690983202000},"page":"01-06","source":"Crossref","is-referenced-by-count":1,"title":["Data Protection Device"],"prefix":"10.1109","author":[{"given":"Teodor","family":"B\u0103rbuceanu","sequence":"first","affiliation":[{"name":"University Politehnica of Bucharest,Faculty of Electronics, Telecommunication and Information Technology,Bucharest,RO"}]},{"given":"Razvan","family":"Craciunescu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest,Faculty of Electronics, Telecommunication and Information Technology,Bucharest,RO"}]},{"given":"Eduard","family":"Popovici","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest,Faculty of Electronics, Telecommunication and Information Technology,Bucharest,RO"}]}],"member":"263","reference":[{"journal-title":"eMMC 5 1- Definitive performance for mobile storage","year":"0","key":"ref8"},{"journal-title":"eMMC Protocol","year":"2021","key":"ref7"},{"journal-title":"UFS 4 0 is the next flash storage specification but what does it mean for you?","year":"2022","key":"ref12"},{"journal-title":"UFS 2 1 The next level of mobile storage","year":"0","key":"ref9"},{"journal-title":"The Cost of Insecure Mobile Devices in the Workplace","year":"2024","key":"ref4"},{"journal-title":"The Latest Two-Factor Authentication Statistics 2023 You Shouldn't Ignore","year":"2023","key":"ref3"},{"journal-title":"Mobile Theft and Loss Report - 2020\/2021 Edition de Beatriz Henriquez","year":"2022","key":"ref6"},{"journal-title":"UFS 4 0 Flagship storage For flagship smartphones","year":"0","key":"ref11"},{"journal-title":"de Elaine J Hom","article-title":"Mobile Device Security: Startling Statistics on Data Loss and Data Breaches","year":"0","key":"ref5"},{"journal-title":"UFS 3 1 The future of mobile storage","year":"0","key":"ref10"},{"journal-title":"A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life de Joanna Stern si Nicole Nguyen","year":"2023","key":"ref2"},{"journal-title":"Breaking down the phone the epidemic","year":"2014","key":"ref1"}],"event":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2023,6,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10193876\/10193857\/10194205.pdf?arnumber=10194205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T13:43:04Z","timestamp":1692625384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10194205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ecai58194.2023.10194205","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}