{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:56:21Z","timestamp":1767167781921,"version":"3.48.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012818","name":"Comunidad de Madrid","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1109\/mswim67937.2025.11308995","type":"proceedings-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T18:35:11Z","timestamp":1767119711000},"page":"714-716","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy in DNS Communications with Energy-Aware Methodologies"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Jimenez-Berenguel","sequence":"first","affiliation":[{"name":"Universidad Carlos III de Madrid,Dept. of Telematic Engineering,Legan&#x00E9;s (Madrid),Spain"}]},{"given":"Celeste","family":"Campo","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Dept. of Telematic Engineering,Legan&#x00E9;s (Madrid),Spain"}]},{"given":"Marta","family":"Moure-Garrido","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Dept. of Telematic Engineering,Legan&#x00E9;s (Madrid),Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3127540.3127567"},{"key":"ref2","first-page":"103601","article-title":"Inferring mobile applications usage from DNS traffic","volume-title":"Ad Hoc Networks","volume":"163","author":"Campo","year":"2024"},{"issue":"9","key":"ref3","article-title":"Reducing dns traffic to enhance home iot device privacy","volume-title":"Sensors","volume":"24","author":"Moure-Garrido","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987451"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3221981"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9230","article-title":"Oblivious DNS over HTTPS","volume-title":"RFC 9230","author":"Kinnear","year":"2022"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3633695","article-title":"DNS Query Forgery: A Client-Side Defense Against Mobile App Traffic Profiling","author":"Jimenez-Berenguel","year":"2025"},{"article-title":"PARROT: Portable Android Reproducible traffic Observation Tool","year":"2025","author":"Jimenez-Berenguel","key":"ref8"}],"event":{"name":"2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)","start":{"date-parts":[[2025,10,27]]},"location":"Barcelona, Spain","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11308132\/11308718\/11308995.pdf?arnumber=11308995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:51:49Z","timestamp":1767167509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11308995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/mswim67937.2025.11308995","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}