{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:52:19Z","timestamp":1730271139161,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/isba.2017.7947689","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:35:15Z","timestamp":1497566115000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Passive fingerprinting for wireless devices: A multi-level decision approach"],"prefix":"10.1109","author":[{"family":"Chao Shen","sequence":"first","affiliation":[]},{"family":"Ruiyuan Lu","sequence":"additional","affiliation":[]},{"given":"Saeid","family":"Samizade","sequence":"additional","affiliation":[]},{"family":"Liang He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1012.0352"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990703"},{"key":"ref12","first-page":"64","author":"francois","year":"2011","journal-title":"Enforcing security with behavioral finger-printing in Proc 7th Int Conf Netw Serv Manage"},{"key":"ref13","article-title":"Identifying Unique Devices through Wireless Fingerprinting","author":"loh","year":"2008","journal-title":"ACM WiSec"},{"key":"ref14","article-title":"On the reliability of wireless finger-printing using clock skews","author":"arackaparambil","year":"2010","journal-title":"Proc ACM WiSec'10"},{"key":"ref15","article-title":"Passive data link layer 802.11 wireless device driver finger-printing","author":"franklin","year":"2006","journal-title":"Proc 15th USENIX Security Symposium"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref17","article-title":"Ripps. Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning","author":"mano","year":"2007","journal-title":"ACM Transactions on Information and System Security"},{"key":"ref18","first-page":"93","author":"wei","year":"2007","journal-title":"IMC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652101"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"ref3","article-title":"A statistical approach to remote physical device fingerprinting","author":"russ","year":"2007","journal-title":"Proc of the Military Communications Conference"},{"key":"ref6","first-page":"813","article-title":"Zinnen skew based remote device fingerprinting demystified","author":"lanze","year":"2012","journal-title":"Proc IEEE Global Commun Conf"},{"key":"ref5","first-page":"211","article-title":"Remote hysical device fingerprinting","author":"kohno","year":"2005","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref8","first-page":"383","article-title":"A passive approach to wireless device fingerprinting","author":"gao","year":"2010","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.8"},{"journal-title":"Fingerprinting 802 11 Devices","year":"2006","author":"cache","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"ref9","first-page":"1","article-title":"GTID: A Technique for Physical Device and Device Type Fingerprinting","volume":"12","author":"radhakrishnan","year":"2015","journal-title":"IEEE Tran-sactions on Dependable & Secure Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1160987.1161002"}],"event":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","start":{"date-parts":[[2017,2,22]]},"location":"New Delhi, India","end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938565\/7947678\/07947689.pdf?arnumber=7947689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T23:47:42Z","timestamp":1498607262000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isba.2017.7947689","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}