{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:38:22Z","timestamp":1761172702237,"version":"build-2065373602"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,9]]},"DOI":"10.1109\/etfa65518.2025.11205612","type":"proceedings-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:07:47Z","timestamp":1761066467000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Towards Privacy Analysis of Internet-based Messaging Applications"],"prefix":"10.1109","author":[{"given":"Muqaddas","family":"Naz","sequence":"first","affiliation":[{"name":"University of Greenwich,Centre for Sustainable Cyber Security,London"}]},{"given":"Muhammad Taimoor","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Greenwich,Centre for Sustainable Cyber Security,London"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Impact Report 2022 - Internet Society \u2014 internetsociety.org"},{"key":"ref2","article-title":"Cost of a data breach 2024 \u2014 IBM \u2014 ibm.com"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IndiaCom.2014.6828062"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref5","first-page":"82","article-title":"An efficient cryptographic protocol verifier based on prolog rules. 2014","volume":"10","author":"Blanchet","journal-title":"doi"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00047"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3546186.3549929"},{"author":"University","key":"ref9","article-title":"RefactorErl - Refactoring Erlang Programs \u2014 plc.inf.elte.hu"},{"key":"ref10","article-title":"Supporting secure coding with refactorerl","author":"Baranyai","year":"2020","journal-title":"Submitted to the ANNALES Universitatis Scientiarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae Sectio Computatorica"},{"key":"ref12","article-title":"Spawning external executables \u2014 erlef.github.io"},{"key":"ref13","article-title":"Supporting secure coding with refactorerl","author":"Baranyai","year":"2020","journal-title":"Submitted to the ANNALES Universitatis Scientiarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae Sectio Computatorica"},{"key":"ref14","article-title":"A03 Injection - OWASP Top 10:2021 \u2014 owasp.org"},{"key":"ref15","article-title":"CWE - CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u2019OS Command Injection\u2019) (4.16) \u2014 cwe.mitre.org"},{"key":"ref16","article-title":"XEP-0016: Privacy Lists \u2014 xmpp.org"},{"key":"ref17","article-title":"CWE - CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u2019Race Condition\u2019) (4.16) \u2014 cwe.mitre.org"},{"key":"ref18","article-title":"Preventing atom exhaustion \u2014 erlef.github.io"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW63542.2024.00061"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00042"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM55673.2022.10068701"}],"event":{"name":"2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2025,9,9]]},"location":"Porto, Portugal","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11205475\/11205526\/11205612.pdf?arnumber=11205612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:25:22Z","timestamp":1761110722000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11205612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/etfa65518.2025.11205612","relation":{},"subject":[],"published":{"date-parts":[[2025,9,9]]}}}