{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:07Z","timestamp":1750220107616,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["84003751"],"award-info":[{"award-number":["84003751"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,15]]},"DOI":"10.1145\/3528580.3528584","type":"proceedings-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T16:22:40Z","timestamp":1658420560000},"page":"17-20","source":"Crossref","is-referenced-by-count":2,"title":["Towards Passive Identification of Aged Android Devices in the Home Network"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Bub","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Applied Sciences, Germany"}]},{"given":"Laura","family":"Hartmann","sequence":"additional","affiliation":[{"name":"Center for Technology and Transfer, University of Applied Sciences, Germany"}]},{"given":"Zdravko","family":"Bozakov","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Applied Sciences, Germany"}]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Center for Technology and Transfer, University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/IOTAIS.2018.8600824"},{"unstructured":"B. Bezawada M. Bachani J. Peterson H. Shirazi I. Ray and I. Ray. 2018. IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs\/1804.03852(2018) 11\u00a0pages. arXiv:1804.03852http:\/\/arxiv.org\/abs\/1804.03852  B. Bezawada M. Bachani J. Peterson H. Shirazi I. Ray and I. Ray. 2018. IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs\/1804.03852(2018) 11\u00a0pages. arXiv:1804.03852http:\/\/arxiv.org\/abs\/1804.03852","key":"e_1_3_2_1_2_1"},{"volume-title":"Retrieved","year":"2021","unstructured":"Philippe Biondi and the Scapy\u00a0community. 2021. Packet crafting for Python2 and Python3 . Retrieved November 29, 2021 from https:\/\/pypi.org\/project\/scapy\/ Philippe Biondi and the Scapy\u00a0community. 2021. Packet crafting for Python2 and Python3. Retrieved November 29, 2021 from https:\/\/pypi.org\/project\/scapy\/","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_5_1","volume-title":"Internet of Things (IoT) connected devices installed base worldwide from 2015 to","author":"Statista\u00a0Research Department","year":"2025","unstructured":"Statista\u00a0Research Department . 2016. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 . Statista, Inc. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide Statista\u00a0Research Department. 2016. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. Statista, Inc. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide"},{"unstructured":"J. Greis A. Yushchenko D. Vogel M. Meier and V. Steinhage. 2021. Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning. CoRR abs\/2102.08199(2021). https:\/\/arxiv.org\/abs\/2102.08199  J. Greis A. Yushchenko D. Vogel M. Meier and V. Steinhage. 2021. Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning. CoRR abs\/2102.08199(2021). https:\/\/arxiv.org\/abs\/2102.08199","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177\u20132184","author":"Miettinen M.","year":"2017","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A.-R. Sadeghi , and S. Tarkoma . 2017 . IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177\u20132184 . https:\/\/doi.org\/10.1109\/ICDCS. 2017 .283 M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and S. Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2177\u20132184. https:\/\/doi.org\/10.1109\/ICDCS.2017.283"},{"volume-title":"Proceedings of the 21st ACM Internet Measurement Conference (Virtual Event) (IMC \u201921)","author":"Paracha T.","unstructured":"M.\u00a0 T. Paracha , D.\u00a0 J. Dubois , N. Vallina-Rodriguez , and D. Choffnes . 2021. IoTLS: Understanding TLS Usage in Consumer IoT Devices . In Proceedings of the 21st ACM Internet Measurement Conference (Virtual Event) (IMC \u201921) . Association for Computing Machinery, New York, NY, USA, 165\u2013178. M.\u00a0T. Paracha, D.\u00a0J. Dubois, N. Vallina-Rodriguez, and D. Choffnes. 2021. IoTLS: Understanding TLS Usage in Consumer IoT Devices. In Proceedings of the 21st ACM Internet Measurement Conference (Virtual Event) (IMC \u201921). Association for Computing Machinery, New York, NY, USA, 165\u2013178.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"crossref","unstructured":"E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. 160\u00a0pages. https:\/\/doi.org\/10.17487\/RFC8446  E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. 160\u00a0pages. https:\/\/doi.org\/10.17487\/RFC8446","key":"e_1_3_2_1_9_1","DOI":"10.17487\/RFC8446"},{"volume-title":"Retrieved","year":"2021","unstructured":"scikit-learn developers. 2021 . 1.10. Decision Trees. scikit-learn developers . Retrieved February 17, 2022 from https:\/\/scikit-learn.org\/stable\/modules\/tree.html scikit-learn developers. 2021. 1.10. Decision Trees. scikit-learn developers. Retrieved February 17, 2022 from https:\/\/scikit-learn.org\/stable\/modules\/tree.html","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"crossref","unstructured":"J. Sun K. Sun and C. Shenefiel. 2019. Automated IoT Device Fingerprinting Through Encrypted Stream Classification. In SecureComm. 22\u00a0pages.  J. Sun K. Sun and C. Shenefiel. 2019. Automated IoT Device Fingerprinting Through Encrypted Stream Classification. In SecureComm. 22\u00a0pages.","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-030-37228-6_8"},{"volume-title":"SourceForge. Retrieved","year":"2021","unstructured":"weka. 2021 . Class REPTree . SourceForge. Retrieved February 17, 2022 from https:\/\/weka.sourceforge.io\/doc.dev\/weka\/classifiers\/trees\/REPTree.html weka. 2021. Class REPTree. SourceForge. Retrieved February 17, 2022 from https:\/\/weka.sourceforge.io\/doc.dev\/weka\/classifiers\/trees\/REPTree.html","key":"e_1_3_2_1_12_1"},{"volume-title":"SourceForge. Retrieved","year":"2021","unstructured":"weka. 2021 . Class SpreadSubsample . SourceForge. Retrieved April 19, 2022 from https:\/\/weka.sourceforge.io\/doc.dev\/weka\/filters\/supervised\/instance\/SpreadSubsample.html weka. 2021. Class SpreadSubsample. SourceForge. Retrieved April 19, 2022 from https:\/\/weka.sourceforge.io\/doc.dev\/weka\/filters\/supervised\/instance\/SpreadSubsample.html","key":"e_1_3_2_1_13_1"}],"event":{"acronym":"EICC 2022","name":"EICC 2022: European Interdisciplinary Cybersecurity Conference","location":"Barcelona Spain"},"container-title":["EICC 2022: Proccedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528580.3528584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3528580.3528584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:33Z","timestamp":1750183833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528580.3528584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,15]]},"references-count":13,"alternative-id":["10.1145\/3528580.3528584","10.1145\/3528580"],"URL":"https:\/\/doi.org\/10.1145\/3528580.3528584","relation":{},"subject":[],"published":{"date-parts":[[2022,6,15]]}}}