{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:08:28Z","timestamp":1772892508902,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766517","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":105,"title":["How talkative is your mobile device?"],"prefix":"10.1145","author":[{"given":"Julien","family":"Freudiger","sequence":"first","affiliation":[{"name":"PARC"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/developer.android.com\/about\/dashboards\/index.html","author":"Dashboards Developer","year":"2015"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504742"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978634"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583443"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567086"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263700"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.04.001"},{"key":"e_1_3_2_1_8_1","unstructured":"Euclid Analytics. Answers and insights for physical locations. http:\/\/euclidanalytics.com\/ 2015.  Euclid Analytics. Answers and insights for physical locations. http:\/\/euclidanalytics.com\/ 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Usenix Security","author":"Franklin J.","year":"2006"},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop on wireless networking for intelligent transportation systems (Win-ITS)","author":"Freudiger J.","year":"2007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378607"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947915.1947920"},{"key":"e_1_3_2_1_14_1","unstructured":"IEEE. MA-L PUBLIC LISTING. http:\/\/standards.ieee.org\/develop\/regauth\/oui\/public.html 2015. ISO\/IEC 8802 standards.  IEEE. MA-L PUBLIC LISTING. http:\/\/standards.ieee.org\/develop\/regauth\/oui\/public.html 2015. ISO\/IEC 8802 standards."},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)","author":"IEEE Standard Association","year":"2012"},{"key":"e_1_3_2_1_16_1","volume-title":"LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks. S&P poster","author":"Kim Y. S.","year":"2013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.65"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514293"},{"key":"e_1_3_2_1_19_1","volume-title":"iOS8 MAC randomization - Analyzed! http:\/\/blog.airtightnetworks.com\/ios8-mac-randomization-analyzed","author":"Misra B.","year":"2014"},{"key":"e_1_3_2_1_20_1","volume-title":"White Paper","year":"2014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_23_1","unstructured":"Path Intelligence. Revolutionary technology for detailed data insights. http:\/\/www.pathintelligence.com\/technology\/ 2015.  Path Intelligence. Revolutionary technology for detailed data insights. http:\/\/www.pathintelligence.com\/technology\/ 2015."},{"key":"e_1_3_2_1_24_1","volume-title":"Is Your Android Device Telling the World Where You've Been? http:\/\/goo.gl\/3XezqR","author":"Eckersley Peter","year":"2014"},{"key":"e_1_3_2_1_25_1","unstructured":"Sensepost. Snoopy: Distributed Tracking and Profiling Framework. http:\/\/research.sensepost.com\/conferences\/2012\/distributed_tracking_and_profiling_framework 2012.  Sensepost. Snoopy: Distributed Tracking and Profiling Framework. http:\/\/research.sensepost.com\/conferences\/2012\/distributed_tracking_and_profiling_framework 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_27_1","author":"Thilakarathna K.","year":"2013","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_28_1","volume-title":"Mark V Standard. https:\/\/hakshop.myshopify.com\/products\/wifi-pineapple","author":"Pineapple WiFi","year":"2015"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"New York New York","acronym":"WiSec'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766517"}},"subtitle":["an experimental study of Wi-Fi probe requests"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":28,"alternative-id":["10.1145\/2766498.2766517","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766517","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}