{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:35Z","timestamp":1750220855332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T00:00:00Z","timestamp":1568246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009409","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["19-71-00041"],"award-info":[{"award-number":["19-71-00041"]}],"id":[{"id":"10.13039\/100009409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,12]]},"DOI":"10.1145\/3357613.3357627","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:19:56Z","timestamp":1574687996000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Actual and historical state of side channel attacks theory"],"prefix":"10.1145","author":[{"given":"Andrey V.","family":"Krasovsky","sequence":"first","affiliation":[{"name":"Southern Federal University, Taganrog, Russia"}]},{"given":"Ekaterina A.","family":"Maro","sequence":"additional","affiliation":[{"name":"Southern Federal University, Taganrog, Russia"}]}],"member":"320","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"104","volume-title":"Germany: Springer","author":"Kocher","year":"1996"},{"key":"e_1_3_2_1_2_1","first-page":"388","volume-title":"Germany: Springer","author":"Kocher J.","year":"1999"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_4_1","first-page":"719","volume-title":"USENIX Security Symp.","author":"Yarom K.","year":"2014"},{"key":"e_1_3_2_1_5_1","first-page":"565","volume-title":"USENIX Security Symp.","author":"Pessl D.","year":"2016"},{"key":"e_1_3_2_1_6_1","first-page":"785","volume-title":"USENIX Security Symp.","author":"Michalevsky A.","year":"2015"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Fuller M. Millett The Future of Computing Performance: Game Over or Next Level?. Washington DC: The National Academies Press. National Research Council. 2011. S. Fuller M. Millett The Future of Computing Performance: Game Over or Next Level?. Washington DC: The National Academies Press. National Research Council. 2011.","DOI":"10.1109\/MC.2011.15"},{"key":"e_1_3_2_1_8_1","unstructured":"The Mobile Economy 2015. www.gsmaintelligence.com The Mobile Economy 2015. www.gsmaintelligence.com"},{"key":"e_1_3_2_1_9_1","first-page":"200","article-title":"Electromagnetic analysis (EMA): Measures and counter-measures for smart cards,\" in Smart Card Programming and Security---E-Smart 2001 (LNCS 2140). Heidelberg, Germany","author":"Quisquater D.","year":"2001","journal-title":"Springer"},{"key":"e_1_3_2_1_10_1","first-page":"17","volume-title":"Workshop Smartcard Technol. (Smartcard)","author":"Messerges E. A.","year":"1999"},{"key":"e_1_3_2_1_11_1","first-page":"219","volume-title":"Switzerland: Springer","author":"Hutter J.-M.","year":"2013"},{"volume-title":"Proceedings of Esmart 2002 3rd edition","year":"2002","author":"Jean-Jacques Quisquater","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"B. Giller. Implementing Practical Electrical Glitching Attacks. https:\/\/www.blackhat.com\/docs\/eu-15\/materials\/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf. B. Giller. Implementing Practical Electrical Glitching Attacks. https:\/\/www.blackhat.com\/docs\/eu-15\/materials\/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf."},{"key":"e_1_3_2_1_14_1","first-page":"513","volume-title":"Germany: Springer","author":"Biham A.","year":"1997"},{"key":"e_1_3_2_1_15_1","first-page":"89","volume-title":"Fault Diagnosis Tolerance Cryptograph. (FDTC)","author":"Roscian A.","year":"2013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0128-3"},{"key":"e_1_3_2_1_17_1","first-page":"91","volume-title":"Fault Diagnosis Tolerance Cryptograp. (FDTC)","author":"van Woudenberg M. F.","year":"2011"},{"key":"e_1_3_2_1_18_1","first-page":"2","volume-title":"Germany: Springer","author":"Skorobogatov R. J.","year":"2002"},{"key":"e_1_3_2_1_19_1","first-page":"719","volume-title":"USENIX Security Symp.","author":"Yarom K.","year":"2014"},{"key":"e_1_3_2_1_20_1","first-page":"57","volume-title":"Switzerland: Springer","author":"Miskovic G. M.","year":"2015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Vincent F. Taylor ; Riccardo Spolaor ; Mauro Conti ; Ivan Martinovic \u00abAppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic\u00bb \/\/ 2016 IEEE European Symposium on Security and Privacy (EuroS&P) Vincent F. Taylor ; Riccardo Spolaor ; Mauro Conti ; Ivan Martinovic \u00abAppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic\u00bb \/\/ 2016 IEEE European Symposium on Security and Privacy (EuroS&P)","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_22_1","first-page":"565","volume-title":"USENIX Security Symp.","author":"Pessl D.","year":"2016"},{"key":"e_1_3_2_1_23_1","first-page":"23","article-title":"TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript","volume":"26","author":"Mehrnezhad E.","year":"2016","journal-title":"J. Inf. Security Appl."},{"volume-title":"S. ARMageddon: Cache Attacks on Mobile Devices. USENIX 2016","author":"Lipp M.","key":"e_1_3_2_1_24_1"},{"volume-title":"ACM CCS 2015","author":"Oren Y.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3134"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"volume-title":"USA: IEEE Press","year":"2012","author":"Kim Yoongu","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","first-page":"490","article-title":"Bringing access-based cache attacks on AES to practice \/\/","author":"Gullasch David","year":"2011","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy."},{"issue":"2","key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4213\/mvk190","article-title":"A timing attack on CUDA implementations of an AES-type block cipher","volume":"7","author":"Fomin","year":"2016","journal-title":"Mat. Vopr. Kriptogr."},{"volume-title":"Faculty of Information Technology","year":"2019","author":"Zahumensk\u00fd","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"DanielJ. Bernstein Cache-timing attacks on AES \/\/ https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf DanielJ. Bernstein Cache-timing attacks on AES \/\/ https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Michael Neve Jean-Pierre Seifert and Zhenghong Wang. A refined look at Bernstein's AES side-channel analysis. \/\/ ASIACCS p. 369 2006. Michael Neve Jean-Pierre Seifert and Zhenghong Wang. A refined look at Bernstein's AES side-channel analysis. \/\/ ASIACCS p. 369 2006.","DOI":"10.1145\/1128817.1128887"},{"volume-title":"SAC","year":"2006","author":"Neve M.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","unstructured":"Eran Tromer Dag Arne Osvik and Adi Shamir Efficient Cache Attacks on AES and Countermeasures \/\/ https:\/\/www.cs.tau.ac.il\/~tromer\/papers\/cache-joc-20090619.pdf Eran Tromer Dag Arne Osvik and Adi Shamir Efficient Cache Attacks on AES and Countermeasures \/\/ https:\/\/www.cs.tau.ac.il\/~tromer\/papers\/cache-joc-20090619.pdf"},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Cache Attacks and Countermeasures: the Case of AES \/\/ Topics","author":"Osvik Dag","year":"2005","journal-title":"Cryptology."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Tromer Eran Osvik Dag. Efficient cache attacks on AES and countermeasures \/\/ Journal of Cryptology. 23(1) 2010. pp. 37--71. Tromer Eran Osvik Dag. Efficient cache attacks on AES and countermeasures \/\/ Journal of Cryptology. 23(1) 2010. pp. 37--71.","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_39_1","unstructured":"Eisenbarth Thomas. A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing - and its Application to AES \/\/ IEEE Symposium on Security and Privacy. 2015. Eisenbarth Thomas. A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing - and its Application to AES \/\/ IEEE Symposium on Security and Privacy. 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Vishal Saraswat Daniel Feldman Denis Foo Kune Satyajit Das Remote cache-timing attacks against AES \/\/ Proceedings of the First Workshop on Cryptography and Security in Computing Systems 2014. Vishal Saraswat Daniel Feldman Denis Foo Kune Satyajit Das Remote cache-timing attacks against AES \/\/ Proceedings of the First Workshop on Cryptography and Security in Computing Systems 2014.","DOI":"10.1145\/2556315.2556322"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau Ilya Mironov Cache-Collision Timing Attacks Against AES \/\/ https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2006\/10\/aes-timing.pdf Joseph Bonneau Ilya Mironov Cache-Collision Timing Attacks Against AES \/\/ https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2006\/10\/aes-timing.pdf","DOI":"10.1007\/11894063_16"},{"key":"e_1_3_2_1_42_1","unstructured":"Sergei P. Skorobogatov Christopher Woods In the blink of an eye: There goes your AES key \/\/ https:\/\/www.researchgate.net\/publication\/260324932_In_the_blink_of_an_eye_There_goes_your_AES_key Sergei P. Skorobogatov Christopher Woods In the blink of an eye: There goes your AES key \/\/ https:\/\/www.researchgate.net\/publication\/260324932_In_the_blink_of_an_eye_There_goes_your_AES_key"},{"key":"e_1_3_2_1_43_1","unstructured":"Lu Zhang Luis Vega Michael Taylor Power Side Channels in Security ICs: Hardware Countermeasures \/\/ https:\/\/arxiv.org\/abs\/1605.00681 Lu Zhang Luis Vega Michael Taylor Power Side Channels in Security ICs: Hardware Countermeasures \/\/ https:\/\/arxiv.org\/abs\/1605.00681"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286711"},{"key":"e_1_3_2_1_45_1","first-page":"281","volume-title":"IEEE Int. Con. on computer design (ICCD)","author":"Luo C","year":"2015"},{"key":"e_1_3_2_1_46_1","first-page":"69","volume-title":"March 2018","volume":"2","author":"Chao Luo"},{"key":"e_1_3_2_1_47_1","first-page":"293","volume-title":"ACNS 2003","author":"Pierre Dusart","year":"2003"},{"key":"e_1_3_2_1_48_1","first-page":"118","volume-title":"LNCS","volume":"2727","author":"Chen C.N.","year":"2003"},{"key":"e_1_3_2_1_50_1","first-page":"27","volume-title":"Lecture Notes in Computer Science","volume":"3373","author":"Giraud C.","year":"2004"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Takahashi J. Fukunaga T. Yamakoshi K.: DFA mechanism on the AES key schedule. In: Breveglieri L. Gueron S. Koren I. Naccache D. Seifert J.P. (eds.) FDTC pp. 62--74. IEEE Computer Society (2007) Takahashi J. Fukunaga T. Yamakoshi K.: DFA mechanism on the AES key schedule. In: Breveglieri L. Gueron S. Koren I. Naccache D. Seifert J.P. (eds.) FDTC pp. 62--74. IEEE Computer Society (2007)","DOI":"10.1109\/FDTC.2007.13"},{"key":"e_1_3_2_1_52_1","first-page":"48","volume-title":"LNCS","volume":"5189","author":"Kim C.H.","year":"2008"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.26"},{"key":"e_1_3_2_1_56_1","unstructured":"Li Y. Gomisawa S. Sakiyama K. Ohta K.: An Information Theoretic Perspective on the Differential Fault Analysis against AES. Cryptology ePrint Archive Report 2010\/032 (2010). Li Y. Gomisawa S. Sakiyama K. Ohta K.: An Information Theoretic Perspective on the Differential Fault Analysis against AES. Cryptology ePrint Archive Report 2010\/032 (2010)."},{"key":"e_1_3_2_1_59_1","first-page":"3","article-title":"Differential fault analysis against AES-192 and AES-256 with minimal faults. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) Fault Diagnosis and Tolerance","author":"Kim C.H.","year":"2010","journal-title":"Cryptography---FDTC"},{"key":"e_1_3_2_1_61_1","first-page":"1","article-title":"Improved differential fault analysis on AES key schedule","author":"Kim C.","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur. (99)"},{"key":"e_1_3_2_1_62_1","first-page":"73","volume-title":"June 2013","volume":"3","author":"Sk Subidh Ali"},{"key":"e_1_3_2_1_64_1","first-page":"97","volume-title":"LNCS","volume":"5747","author":"Renauld M.","year":"2009"},{"key":"e_1_3_2_1_65_1","first-page":"140","volume-title":"LNCS","volume":"7428","author":"Oren Y.","year":"2012"},{"key":"e_1_3_2_1_66_1","unstructured":"Oren Y. Wool A.: Tolerant algebraic side-channel analysis of AES. In: Cryptology eprint archive report 2012\/092. Oren Y. Wool A.: Tolerant algebraic side-channel analysis of AES. In: Cryptology eprint archive report 2012\/092."},{"key":"e_1_3_2_1_67_1","first-page":"139","volume-title":"September 2013","volume":"3","author":"Mohamed Saied Emam Mohamed"},{"key":"e_1_3_2_1_68_1","unstructured":"Owen Lo William J Buchanan and Douglas Carson. 2016. Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology 1 1 (2016) 1--20. Owen Lo William J Buchanan and Douglas Carson. 2016. Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology 1 1 (2016) 1--20."},{"first-page":"259","volume-title":"International Conference on Principles and Practice of Constraint Programming 2018: Principles and Practice of Constraint Programming","author":"Fanghui Liu","key":"e_1_3_2_1_69_1"},{"volume-title":"Reliability and Security","year":"2018","author":"Owen Lo J","key":"e_1_3_2_1_70_1"},{"volume-title":"Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016. 8--12","year":"2016","author":"Xiaoyi Duan","key":"e_1_3_2_1_71_1"},{"volume-title":"CIS. Edited by: Schindler W, Huss SA.","year":"2010","author":"Wang G","key":"e_1_3_2_1_72_1"},{"key":"e_1_3_2_1_73_1","unstructured":"Zhao X Wang T Guo S: Fault-propagation pattern based DFA on SPN structure block ciphers using bitwise permutation with application to PRESENT and PRINTcipher. IACR Cryptology ePrint Arch 2011 2011: 86. Zhao X Wang T Guo S: Fault-propagation pattern based DFA on SPN structure block ciphers using bitwise permutation with application to PRESENT and PRINTcipher. IACR Cryptology ePrint Arch 2011 2011: 86."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Nasour Bagheri Reza Ebrahimpour Navid Ghaedi New differential fault analysis on PRESENT \/\/ EURASIP Journal on Advances in Signal Processing 2013 Nasour Bagheri Reza Ebrahimpour Navid Ghaedi New differential fault analysis on PRESENT \/\/ EURASIP Journal on Advances in Signal Processing 2013","DOI":"10.1186\/1687-6180-2013-145"},{"first-page":"174","volume-title":"International Workshop on Constructive Side-Channel Analysis and Secure Design 2015: Constructive Side-Channel Analysis and Secure Design","author":"Nahid Farhady Ghalaty","key":"e_1_3_2_1_75_1"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Lin Yang Meiqin Wang and Siyuan Qiao. 2009. Side channel cube attack on PRESENT \/\/ Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5888 LNCS 60525201 (2009) 379--391. Lin Yang Meiqin Wang and Siyuan Qiao. 2009. Side channel cube attack on PRESENT \/\/ Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5888 LNCS 60525201 (2009) 379--391.","DOI":"10.1007\/978-3-642-10433-6_25"},{"key":"e_1_3_2_1_77_1","unstructured":"Xinjie Zhao Tao Wang and Shize Guo. 2011. Improved Side Channel Cube Attacks on PRESENT. 165 (2011) 1--11. http:\/\/eprint.iacr.org\/2011\/165 Xinjie Zhao Tao Wang and Shize Guo. 2011. Improved Side Channel Cube Attacks on PRESENT. 165 (2011) 1--11. http:\/\/eprint.iacr.org\/2011\/165"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2012.760732"},{"key":"e_1_3_2_1_79_1","unstructured":"Jakub Breier Wei He Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA \/\/ https:\/\/arxiv.org\/pdf\/1702.08208.pdf Jakub Breier Wei He Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA \/\/ https:\/\/arxiv.org\/pdf\/1702.08208.pdf"},{"key":"e_1_3_2_1_80_1","first-page":"25","article-title":"Oneplus one is more than two: a practical combination of powerand fault analysis attacks on PRESENT and PRESENT-like blockciphers,\" in 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","author":"Patranabis J.","year":"2017","journal-title":"IEEE"},{"key":"e_1_3_2_1_81_1","unstructured":"Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers \/\/ https:\/\/eprint.iacr.org\/2019\/545.pdf Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers \/\/ https:\/\/eprint.iacr.org\/2019\/545.pdf"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Mathieu Renauld Francois-Xavier Standaert Algebraic Side-Channel Attacks \/\/ https:\/\/eprint.iacr.org\/2009\/279.pdf Mathieu Renauld Francois-Xavier Standaert Algebraic Side-Channel Attacks \/\/ https:\/\/eprint.iacr.org\/2009\/279.pdf","DOI":"10.1007\/978-3-642-16342-5_29"},{"volume-title":"University of Wollongong","year":"2012","author":"Abdul Latip","key":"e_1_3_2_1_83_1"},{"key":"e_1_3_2_1_84_1","first-page":"1429","volume-title":"October 2013","volume":"17","author":"Jongsung Kim"},{"key":"e_1_3_2_1_85_1","volume-title":"Mat. Vopr. Kriptogr.","volume":"6","author":"Matveev","year":"2015"},{"key":"e_1_3_2_1_86_1","unstructured":"C\u00e9dric Delaunay Alexander Istomin Eric Filiol \"Kuznechik\" Optimized Implementations on FPGA and Microcontrollers and their DPA Analysis Resistance \/\/ XXI -RUSCRYPTO 2019 C\u00e9dric Delaunay Alexander Istomin Eric Filiol \"Kuznechik\" Optimized Implementations on FPGA and Microcontrollers and their DPA Analysis Resistance \/\/ XXI -RUSCRYPTO 2019"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.13"},{"key":"e_1_3_2_1_88_1","unstructured":"Riham AlTawy Onur Duman and Amr M. Youssef Fault Analysis of Kuznyechik \/\/ https:\/\/eprint.iacr.org\/2015\/347.pdf Riham AlTawy Onur Duman and Amr M. Youssef Fault Analysis of Kuznyechik \/\/ https:\/\/eprint.iacr.org\/2015\/347.pdf"},{"key":"e_1_3_2_1_89_1","unstructured":"Andrey V. Krasovsky Teoretical implementation DFA to GOST R 34.12-2015 \u00ab Kuznyechik \u00bb \/\/ https:\/\/eduherald.ru\/pdf\/2018\/3-2\/18236.pdf (in Russian). Andrey V. Krasovsky Teoretical implementation DFA to GOST R 34.12-2015 \u00ab Kuznyechik \u00bb \/\/ https:\/\/eduherald.ru\/pdf\/2018\/3-2\/18236.pdf (in Russian)."}],"event":{"name":"SIN 2019: The 12th International Conference on Security of Information and Networks","acronym":"SIN 2019","location":"Sochi Russia"},"container-title":["Proceedings of the 12th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357613.3357627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357613.3357627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:23Z","timestamp":1750202603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357613.3357627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,12]]},"references-count":81,"alternative-id":["10.1145\/3357613.3357627","10.1145\/3357613"],"URL":"https:\/\/doi.org\/10.1145\/3357613.3357627","relation":{},"subject":[],"published":{"date-parts":[[2019,9,12]]},"assertion":[{"value":"2019-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}