{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:11Z","timestamp":1761621131512},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/iccnc.2013.6504251","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T21:30:11Z","timestamp":1367011811000},"page":"1128-1133","source":"Crossref","is-referenced-by-count":26,"title":["SenSec: Mobile security through passive sensing"],"prefix":"10.1109","author":[{"family":"Jiang Zhu","sequence":"first","affiliation":[]},{"family":"Pang Wu","sequence":"additional","affiliation":[]},{"family":"Xiao Wang","sequence":"additional","affiliation":[]},{"given":"Joy","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Context-aware Security and Secure Contextawareness in Ubiquitous Computing Environments","year":"0","author":"wrona","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.6.1188"},{"journal-title":"Mind as Action","year":"1998","author":"wertsch","key":"18"},{"key":"15","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"0","journal-title":"Proceedings of the 13th International Conference on Information Security ISC'10"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBILWARE2008.2492"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633453"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005738"},{"key":"3","first-page":"12","author":"buthpitiya","year":"2011","journal-title":"N-gram Geo-trace Modeling in Proceedings of Ninth International Conference on Pervasive Computing"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409677"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1525\/9780520340664","author":"burke","year":"1966","journal-title":"Language as Symbolic Action"},{"key":"1","first-page":"2004","article-title":"A survey on context-aware systems","author":"baldauf","year":"2004","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869992"},{"key":"7","first-page":"1","article-title":"Accomplice: Location inference using accelerometers on smartphones","author":"han","year":"2012","journal-title":"COMSNETS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2012.20"},{"key":"4","article-title":"A language approach to modeling human behavior","author":"chen","year":"2010","journal-title":"Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC)"},{"key":"9","first-page":"9","article-title":"Implicit authentication for mobile devices","author":"jakobsson","year":"2009","journal-title":"Proceedings of the 4th USENIX Conference on Hot Topics in Security Ser HotSec'09"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01516-8_11","article-title":"Inferring identity using accelerometers in television remote controls","author":"hao chang","year":"2009","journal-title":"Proceedings of the International Conference on Pervasive Computing"}],"event":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC 2013)","start":{"date-parts":[[2013,1,28]]},"location":"San Diego, CA","end":{"date-parts":[[2013,1,31]]}},"container-title":["2013 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495637\/6504039\/06504251.pdf?arnumber=6504251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T22:02:39Z","timestamp":1644876159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6504251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2013.6504251","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}