{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:01Z","timestamp":1750220401465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,22]]},"DOI":"10.1145\/3479241.3486689","type":"proceedings-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T00:14:24Z","timestamp":1637194464000},"page":"97-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN"],"prefix":"10.1145","author":[{"given":"Lars","family":"Almon","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Arno Manfred","family":"Krause","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Oliver","family":"Fietze","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"L. Almon A. Krause O. Fietze and M. Hollick. 2021. OpenNAN - Neighbor Awareness Networking stack for Linux. https:\/\/seemoo.de\/opennan.  L. Almon A. Krause O. Fietze and M. Hollick. 2021. OpenNAN - Neighbor Awareness Networking stack for Linux. https:\/\/seemoo.de\/opennan."},{"volume-title":"Proceedings of the 13th Workshop on Challenged Networks. 3--10","author":"\u00c1lvarez F.","key":"e_1_3_2_1_2_1","unstructured":"F. \u00c1lvarez , L. Almon , P. Lieser , T. Meuser , Y. Dylla , B. Richerzhagen , M. Hollick , and R. Steinmetz . 2018. Conducting a large-scale field test of a smartphone-based communication network for emergency response . In Proceedings of the 13th Workshop on Challenged Networks. 3--10 . F. \u00c1lvarez, L. Almon, P. Lieser, T. Meuser, Y. Dylla, B. Richerzhagen, M. Hollick, and R. Steinmetz. 2018. Conducting a large-scale field test of a smartphone-based communication network for emergency response. In Proceedings of the 13th Workshop on Challenged Networks. 3--10."},{"key":"e_1_3_2_1_3_1","volume-title":"Wi-Fi Aware overview. https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-aware [Accessed","author":"Documentation Android Developer","year":"2021","unstructured":"Android Developer Documentation . 2021. Wi-Fi Aware overview. https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-aware [Accessed September 29, 2021 ]. Android Developer Documentation. 2021. Wi-Fi Aware overview. https:\/\/developer.android.com\/guide\/topics\/connectivity\/wifi-aware [Accessed September 29, 2021]."},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P) .","author":"Antonioli D.","key":"e_1_3_2_1_4_1","unstructured":"D. Antonioli , N. O. Tippenhauer , and K. Rasmussen . 2020. BIAS: Bluetooth Impersonation AttackS . In Proceedings of the IEEE Symposium on Security and Privacy (S&P) . D. Antonioli, N. O. Tippenhauer, and K. Rasmussen. 2020. BIAS: Bluetooth Impersonation AttackS. In Proceedings of the IEEE Symposium on Security and Privacy (S&P) ."},{"key":"e_1_3_2_1_5_1","volume-title":"26th Annual Network and Distributed System Security Symposium, NDSS","author":"Antonioli D.","year":"2019","unstructured":"D. Antonioli , N. O. Tippenhauer , and K. B. Rasmussen . 2019. Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, USA . D. Antonioli, N. O. Tippenhauer, and K. B. Rasmussen. 2019. Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, USA ."},{"key":"e_1_3_2_1_6_1","volume-title":"Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. Black Hat USA","author":"Artenstein N.","year":"2017","unstructured":"N. Artenstein . 2017 . Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. Black Hat USA (2017). N. Artenstein. 2017. Broadpwn: Remotely compromising Android and iOS via a bug in Broadcom's Wi-Fi chipsets. Black Hat USA (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"Bluetooth Core Specification 5.3. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification\/ [Accessed","author":"Bluetooth SIG.","year":"2021","unstructured":"Bluetooth SIG. 2021. Bluetooth Core Specification 5.3. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification\/ [Accessed September 29, 2021 ]. Bluetooth SIG. 2021. Bluetooth Core Specification 5.3. https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification\/ [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. Camps-Mur A. Garcia-Saavedra and P. Serrano. 2013. Device-to-device communications with Wi-Fi Direct: overview and experimentation. IEEE wireless communications Vol. 20 3 (2013) 96--104.  D. Camps-Mur A. Garcia-Saavedra and P. Serrano. 2013. Device-to-device communications with Wi-Fi Direct: overview and experimentation. IEEE wireless communications Vol. 20 3 (2013) 96--104.","DOI":"10.1109\/MWC.2013.6549288"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7096294"},{"volume-title":"BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th USENIX Workshop on Offensive Technologies (WOOT 21)","author":"Claverie T.","key":"e_1_3_2_1_10_1","unstructured":"T. Claverie and J. L. Esteves . 2021 . BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th USENIX Workshop on Offensive Technologies (WOOT 21) . T. Claverie and J. L. Esteves. 2021. BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols. In 15th USENIX Workshop on Offensive Technologies (WOOT 21) ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"M. Conti F. Delmastro G. Minutiello and R. Paris. 2013. Experimenting opportunistic networks with WiFi Direct. In 2013 IFIP Wireless Days (WD). IEEE 1--6.  M. Conti F. Delmastro G. Minutiello and R. Paris. 2013. Experimenting opportunistic networks with WiFi Direct. In 2013 IFIP Wireless Days (WD). IEEE 1--6.","DOI":"10.1109\/WD.2013.6686501"},{"volume-title":"2017 International Conference on Computing, Networking and Communications (ICNC). IEEE, 491--497","author":"Funai C.","key":"e_1_3_2_1_12_1","unstructured":"C. Funai , C. Tapparello , and W. Heinzelman . 2017. Enabling multi-hop ad hoc networks through Wi-Fi Direct multi-group networking . In 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE, 491--497 . C. Funai, C. Tapparello, and W. Heinzelman. 2017. Enabling multi-hop ad hoc networks through Wi-Fi Direct multi-group networking. In 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE, 491--497."},{"key":"e_1_3_2_1_13_1","unstructured":"X. Gong and P. Pi. 2019. Exploiting Qualcomm WLAN And Modem Over-The-Air. In BlackHat USA .  X. Gong and P. Pi. 2019. Exploiting Qualcomm WLAN And Modem Over-The-Air. In BlackHat USA ."},{"key":"e_1_3_2_1_14_1","unstructured":"Google Developers. 2021 a. Nearby APIs. https:\/\/developers.google.com\/nearby - Accessed September 29 2021.  Google Developers. 2021 a. Nearby APIs. https:\/\/developers.google.com\/nearby - Accessed September 29 2021."},{"key":"e_1_3_2_1_15_1","volume-title":"2021 b. Nearby APIs. https:\/\/developers.google.com\/nearby\/connections\/strategies [Accessed","author":"Developers Google","year":"2021","unstructured":"Google Developers . 2021 b. Nearby APIs. https:\/\/developers.google.com\/nearby\/connections\/strategies [Accessed September 29, 2021 ]. Google Developers. 2021 b. Nearby APIs. https:\/\/developers.google.com\/nearby\/connections\/strategies [Accessed September 29, 2021]."},{"volume-title":"Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access","author":"Henry J.","key":"e_1_3_2_1_16_1","unstructured":"J. Henry and N. Montavont . 2019. Fingerprinting Using Fine Timing Measurement . In Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access ( Miami Beach, FL, USA) (MobiWac '19). Association for Computing Machinery, New York, NY, USA, 49--56. https:\/\/doi.org\/10.1145\/3345770.3356736 10.1145\/3345770.3356736 J. Henry and N. Montavont. 2019. Fingerprinting Using Fine Timing Measurement. In Proceedings of the 17th ACM International Symposium on Mobility Management and Wireless Access (Miami Beach, FL, USA) (MobiWac '19). Association for Computing Machinery, New York, NY, USA, 49--56. https:\/\/doi.org\/10.1145\/3345770.3356736"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Klee S.","key":"e_1_3_2_1_18_1","unstructured":"S. Klee , A. Roussos , M. Maass , and M. Hollick . 2020. NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit . In 14th USENIX Workshop on Offensive Technologies (WOOT 20) . S. Klee, A. Roussos, M. Maass, and M. Hollick. 2020. NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit. In 14th USENIX Workshop on Offensive Technologies (WOOT 20) ."},{"key":"e_1_3_2_1_19_1","unstructured":"Vincent Lee. 2020. Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters. https:\/\/www.zerodayinitiative.com\/blog\/2020\/5\/4\/analyzing-a-trio-of-remote-code-execution-bugs-in-intel-wireless-adapters [Accessed September 29 2021].  Vincent Lee. 2020. Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters. https:\/\/www.zerodayinitiative.com\/blog\/2020\/5\/4\/analyzing-a-trio-of-remote-code-execution-bugs-in-intel-wireless-adapters [Accessed September 29 2021]."},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1--1\/ [Accessed","author":"Alliance LoRa","year":"2021","unstructured":"LoRa Alliance . 2017. LoRa WAN 1.1 Specification . https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1--1\/ [Accessed September 29, 2021 ]. LoRa Alliance. 2017. LoRaWAN 1.1 Specification. https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1--1\/ [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_21_1","volume-title":"Pwn2Own Qualcomm DSP. https:\/\/research.checkpoint.com\/2021\/pwn2own-qualcomm-dsp\/ [Accessed","author":"Makkaveev Slava","year":"2021","unstructured":"Slava Makkaveev . 2021. Pwn2Own Qualcomm DSP. https:\/\/research.checkpoint.com\/2021\/pwn2own-qualcomm-dsp\/ [Accessed September 29, 2021 ]. Slava Makkaveev. 2021. Pwn2Own Qualcomm DSP. https:\/\/research.checkpoint.com\/2021\/pwn2own-qualcomm-dsp\/ [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_22_1","volume-title":"Security Bulletin. https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\/august-2019-bulletin [Accessed","author":"Qualcomm Technologies Inc. 2019.","year":"2021","unstructured":"Qualcomm Technologies Inc. 2019. Security Bulletin. https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\/august-2019-bulletin [Accessed September 29, 2021 ]. Qualcomm Technologies Inc. 2019. Security Bulletin. https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\/august-2019-bulletin [Accessed September 29, 2021]."},{"volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Ruge J.","key":"e_1_3_2_1_23_1","unstructured":"J. Ruge , J. Classen , F. Gringoli , and M. Hollick . 2020. Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets . In 29th USENIX Security Symposium (USENIX Security 20) . 19--36. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ruge. J. Ruge, J. Classen, F. Gringoli, and M. Hollick. 2020. Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. In 29th USENIX Security Symposium (USENIX Security 20). 19--36. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ruge."},{"volume-title":"2016 International Conference on Internet of Things and Applications (IOTA). 137--142","author":"Saloni S.","key":"e_1_3_2_1_24_1","unstructured":"S. Saloni and A. Hegde . 2016. WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: Enabling new proximity based services . In 2016 International Conference on Internet of Things and Applications (IOTA). 137--142 . S. Saloni and A. Hegde. 2016. WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: Enabling new proximity based services. In 2016 International Conference on Internet of Things and Applications (IOTA). 137--142."},{"volume-title":"In Proceedings of 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2021)","author":"Schepers D.","key":"e_1_3_2_1_25_1","unstructured":"D. Schepers , M. Singh , and A. Ranganathan . 2021. Here, There, and Everywhere: Security Analysis of Wi-Fi Fine Timing Measurement . In In Proceedings of 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2021) . D. Schepers, M. Singh, and A. Ranganathan. 2021. Here, There, and Everywhere: Security Analysis of Wi-Fi Fine Timing Measurement. In In Proceedings of 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2021) ."},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/support.sigfox.com\/docs\/rf-protocol-test-specification [Accessed","author":"Protocol Test Sigfox","year":"2021","unstructured":"Sigfox S.A.. 2020. Sigfox RF & Protocol Test Specification v5.0.3. https:\/\/support.sigfox.com\/docs\/rf-protocol-test-specification [Accessed September 29, 2021 ]. Sigfox S.A.. 2020. Sigfox RF & Protocol Test Specification v5.0.3. https:\/\/support.sigfox.com\/docs\/rf-protocol-test-specification [Accessed September 29, 2021]."},{"volume-title":"MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking .","author":"Stute M.","key":"e_1_3_2_1_27_1","unstructured":"M. Stute , D. Kreitschmann , and M. Hollick . 2018a. One Billion Apples' Secret Sauce : Recipe for the Apple Wireless Direct Link Ad hoc Protocol . In MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking . M. Stute, D. Kreitschmann, and M. Hollick. 2018a. One Billion Apples' Secret Sauce : Recipe for the Apple Wireless Direct Link Ad hoc Protocol. In MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking ."},{"key":"e_1_3_2_1_28_1","unstructured":"M. Stute D. Kreitschmann and M. Hollick. 2018b. The Open Wireless Link Project. https:\/\/owlink.org [Accessed September 29 2021].  M. Stute D. Kreitschmann and M. Hollick. 2018b. The Open Wireless Link Project. https:\/\/owlink.org [Accessed September 29 2021]."},{"volume-title":"The 28th USENIX Security Symposium .","author":"Stute M.","key":"e_1_3_2_1_29_1","unstructured":"M. Stute , S. Narain , A. Mariotto , A. Heinrich , D. Kreitschmann , G. Noubir , and M. Hollick . 2019. A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link . In The 28th USENIX Security Symposium . M. Stute, S. Narain, A. Mariotto, A. Heinrich, D. Kreitschmann, G. Noubir, and M. Hollick. 2019. A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. In The 28th USENIX Security Symposium ."},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/z-wavealliance.org\/z-wave-specifications\/ [Accessed","author":"Wave Alliance The","year":"2021","unstructured":"The Z- Wave Alliance . 2021. Z- Wave Specifications . https:\/\/z-wavealliance.org\/z-wave-specifications\/ [Accessed September 29, 2021 ]. The Z-Wave Alliance. 2021. Z-Wave Specifications. https:\/\/z-wavealliance.org\/z-wave-specifications\/ [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_31_1","volume-title":"ZigBee Specification r21. https:\/\/zigbeealliance.org\/solution\/zigbee\/ [Accessed","author":"ZigBee Alliance The","year":"2021","unstructured":"The ZigBee Alliance . 2015. ZigBee Specification r21. https:\/\/zigbeealliance.org\/solution\/zigbee\/ [Accessed September 29, 2021 ]. The ZigBee Alliance. 2015. ZigBee Specification r21. https:\/\/zigbeealliance.org\/solution\/zigbee\/ [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_32_1","volume-title":"https:\/\/www.threadgroup.org\/ThreadSpec [Accessed","author":"Thead Group","year":"2021","unstructured":"Thead Group . 2017. Thread Specification 1.1.1. https:\/\/www.threadgroup.org\/ThreadSpec [Accessed September 29, 2021 ]. Thead Group. 2017. Thread Specification 1.1.1. https:\/\/www.threadgroup.org\/ThreadSpec [Accessed September 29, 2021]."},{"volume-title":"Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). ACM.","author":"Vanhoef M.","key":"e_1_3_2_1_33_1","unstructured":"M. Vanhoef and F. Piessens . 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 . In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). ACM. M. Vanhoef and F. Piessens. 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). ACM."},{"volume-title":"IEEE Symposium on Security & Privacy (SP). IEEE.","author":"Vanhoef M.","key":"e_1_3_2_1_34_1","unstructured":"M. Vanhoef and E. Ronen . 2020. Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd . In IEEE Symposium on Security & Privacy (SP). IEEE. M. Vanhoef and E. Ronen. 2020. Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. In IEEE Symposium on Security & Privacy (SP). IEEE."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.09.003"},{"key":"e_1_3_2_1_36_1","unstructured":"Wi-Fi Alliance. 2015. Neighbor Awareness Networking Technical Specification v1.0.  Wi-Fi Alliance. 2015. Neighbor Awareness Networking Technical Specification v1.0."},{"key":"e_1_3_2_1_37_1","unstructured":"Wi-Fi Alliance. 2016. Wi-Fi Peer-to-Peer Services (P2Ps) Technical Specification v1.7.  Wi-Fi Alliance. 2016. Wi-Fi Peer-to-Peer Services (P2Ps) Technical Specification v1.7."},{"key":"e_1_3_2_1_38_1","volume-title":"Neighbor Awareness Networking Technical Specification v3.2. https:\/\/www.wi-fi.org\/file\/wi-fi-aware-specification [Accessed","author":"Alliance Wi-Fi","year":"2021","unstructured":"Wi-Fi Alliance . 2021. Neighbor Awareness Networking Technical Specification v3.2. https:\/\/www.wi-fi.org\/file\/wi-fi-aware-specification [Accessed September 29, 2021 ]. Wi-Fi Alliance. 2021. Neighbor Awareness Networking Technical Specification v3.2. https:\/\/www.wi-fi.org\/file\/wi-fi-aware-specification [Accessed September 29, 2021]."},{"key":"e_1_3_2_1_39_1","volume-title":"Major Vulnerabilities discovered and patched in Realtek RTL8195A Wi-Fi Module. https:\/\/www.vdoo.com\/blog\/realtek-rtl8195a-vulnerabilities-discovered [Accessed","author":"Yavniely Uriya","year":"2021","unstructured":"Uriya Yavniely . 2021. Major Vulnerabilities discovered and patched in Realtek RTL8195A Wi-Fi Module. https:\/\/www.vdoo.com\/blog\/realtek-rtl8195a-vulnerabilities-discovered [Accessed September 29, 2021 ]. Uriya Yavniely. 2021. Major Vulnerabilities discovered and patched in Realtek RTL8195A Wi-Fi Module. https:\/\/www.vdoo.com\/blog\/realtek-rtl8195a-vulnerabilities-discovered [Accessed September 29, 2021]."}],"event":{"name":"MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Alicante Spain","acronym":"MSWiM '21"},"container-title":["Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479241.3486689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479241.3486689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:51Z","timestamp":1750191531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479241.3486689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":39,"alternative-id":["10.1145\/3479241.3486689","10.1145\/3479241"],"URL":"https:\/\/doi.org\/10.1145\/3479241.3486689","relation":{},"subject":[],"published":{"date-parts":[[2021,11,22]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}