{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T14:06:59Z","timestamp":1772633219288,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS 1822118,CNS 2226232,CNS 2335687,DMS 2123761"],"award-info":[{"award-number":["CNS 1822118,CNS 2226232,CNS 2335687,DMS 2123761"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00022","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"119-129","source":"Crossref","is-referenced-by-count":0,"title":["It's About Time!: Exploiting Timing Variance for IoT Device-Type Fingerprinting"],"prefix":"10.1109","author":[{"given":"Maxwel","family":"Bar-on","sequence":"first","affiliation":[{"name":"Colorado State University,*Department of Computer Science,Fort Collins,CO,80523-1873"}]},{"given":"Alanood","family":"Alqobaisi","sequence":"additional","affiliation":[{"name":"Colorado State University,*Department of Computer Science,Fort Collins,CO,80523-1873"}]},{"given":"Bruhadeshwar","family":"Bezawada","sequence":"additional","affiliation":[{"name":"Southern Arkansas University,Department of Mathematics and Computer Science,Magnolia,AR,71753-5000"}]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University,*Department of Computer Science,Fort Collins,CO,80523-1873"}]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University,*Department of Computer Science,Fort Collins,CO,80523-1873"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148743"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685693"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03478-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3130312"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3183118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2997898"},{"key":"ref8","article-title":"Adam: A method for stochastic optimization","volume-title":"International Conference on Learning Representations","volume":"12","author":"Kingma","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240118"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001639"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom63139.2024.00263"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAFS.2018.8913346"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-022-00568-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3603257"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"ref26","first-page":"55","article-title":"You are what you broadcast: Identification of mobile and IoT devices from (public){WiFi}","volume-title":"In 29th USENIX security symposium (USENIX security 20)","author":"Yu","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467401"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3305585"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410296.pdf?arnumber=11410296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:19:20Z","timestamp":1772608760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00022","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}