{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:27Z","timestamp":1750309287210,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3649403.3656483","type":"proceedings-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T16:04:12Z","timestamp":1715789052000},"page":"20-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy Preserving Context Sensitive Kernel"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4902-3325","authenticated-orcid":false,"given":"Anshul","family":"Bhaware","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5363-3519","authenticated-orcid":false,"given":"Gaurav","family":"Varshney","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6516-9175","authenticated-orcid":false,"given":"Jaswinder","family":"Kour","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6323-0042","authenticated-orcid":false,"given":"Tejaswi","family":"Bishnoi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0153-3162","authenticated-orcid":false,"given":"Mudit","family":"Jain","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0957-7816","authenticated-orcid":false,"given":"Dalchandra","family":"Sharma","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2019.8809084"},{"key":"e_1_3_2_1_2_1","volume-title":"Symposium on Critical Infrastructure Protection and the Law.","author":"Burmester Mike","year":"2002","unstructured":"Mike Burmester, Yvo Desmedt, Rebecca Wright, Alec Yasinsac, et al. 2002. Security or privacy, must we choose?. In Symposium on Critical Infrastructure Protection and the Law."},{"key":"e_1_3_2_1_3_1","unstructured":"Open Text Corporation. 2023. What is an Insider Threat? https:\/\/www.microfocus.com\/en-us\/what-is\/insider-threat."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890932"},{"volume-title":"2011 International Conference for Internet Technology and Secured Transactions. IEEE, Emei Mountain","author":"Halboob Waleed","key":"e_1_3_2_1_5_1","unstructured":"Waleed Halboob, Muhammad Abulaish, and Khaled S. Alghathbar. 2011. Quaternary privacy-levels preservation in computer forensics investigation process. In 2011 International Conference for Internet Technology and Secured Transactions. IEEE, Emei Mountain, Sichuan Province, China, 777--782."},{"key":"e_1_3_2_1_6_1","unstructured":"Cybersecurity Insiders. 2023. 2023 Insider Threat Report (Gurucul). https:\/\/www.cybersecurity-insiders.com\/portfolio\/2023-insider-threat-report-gurucul."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2019.8809179"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ana Nieto Ruben Rios and Javier Lopez. 2019. Privacy-Aware Digital Forensics. In Security and Privacy for Big Data Cloud Computing and Applications lizhe wang wei ren raymoond choo and fatos xhafa ed.). The Institution of Engineering and Technology (IET) United Kingdom.","DOI":"10.1049\/PBPC028E_ch8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2006.341936"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352935"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.156"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649403.3656483","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649403.3656483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:20Z","timestamp":1750291400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649403.3656483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":12,"alternative-id":["10.1145\/3649403.3656483","10.1145\/3649403"],"URL":"https:\/\/doi.org\/10.1145\/3649403.3656483","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}