{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:00:24Z","timestamp":1761663624038},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icc.2017.7997423","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T16:39:10Z","timestamp":1501519150000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Detection of spoofed identities on smartphones via sociability metrics"],"prefix":"10.1109","author":[{"given":"Fazel","family":"Anjomshoa","sequence":"first","affiliation":[]},{"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[]},{"given":"Melike","family":"Erol-Kantarci","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45252-9_9"},{"article-title":"Identification of source of rumors in social networks with incomplete information","year":"2015","author":"louni","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-6030-4.ch009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001415560133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-6239-018-8_4"},{"key":"ref17","first-page":"219","article-title":"An effective approach to continuous user authentication for touch screen smart devices","author":"budurusubmi","year":"2015","journal-title":"Proc of the Int Conf on Soft Quality Reliability and Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2003.1211526"},{"year":"2016","key":"ref19","article-title":"Trackmaison data set and user traits"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386915"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CECNET.2011.5768515"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2014.44"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2480381"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2006.1706507"},{"key":"ref7","first-page":"1152","article-title":"Recognition of walking behaviors for pedestrian navigation","author":"lee","year":"2001","journal-title":"Control Applications 2001 (CCA'01) Proceedings of the 2001 IEEE International Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543880"},{"journal-title":"ITD","article-title":"Ericsson mobility report","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2016.7753422"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224867"}],"event":{"name":"ICC 2017 - 2017 IEEE International Conference on Communications","start":{"date-parts":[[2017,5,21]]},"location":"Paris, France","end":{"date-parts":[[2017,5,25]]}},"container-title":["2017 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7985734\/7996317\/07997423.pdf?arnumber=7997423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T19:45:13Z","timestamp":1503517513000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7997423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2017.7997423","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}