{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T05:20:23Z","timestamp":1735795223376,"version":"3.32.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.23919\/cnsm62983.2024.10814609","type":"proceedings-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:23:43Z","timestamp":1735673023000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Big Brother is Watching You: Non-Intrusive ZigBee User Profiling"],"prefix":"10.23919","author":[{"given":"Katharina O. E.","family":"M\u00fcller","sequence":"first","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland"}]},{"given":"Delia","family":"Datsomor","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland"}]},{"given":"Daria","family":"Schumm","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland"}]},{"given":"Bruno","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Embedded Sensing Group ESG, Institute of Computer Science in Vorarlberg ICV, University of St. Gallen HSG,Switzerland"}]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Switzerland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0430-8"},{"key":"ref2","article-title":"Zigbee 3.0 support in Hue ecosystem"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2290\/1\/012040"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/WF-IoT58464.2023.10539461","article-title":"IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways","author":"Boiano","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC48278.2020.9217236"},{"key":"ref7","first-page":"663","article-title":"Accurately Identify and Localize Commodity Devices from Encrypted Smart Home Traffic","volume-title":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","author":"Guo"},{"key":"ref8","first-page":"1","article-title":"A smart monitoring system for campus using ZigBee wireless sensor networks","volume-title":"International Journal of Software Engineering and Computer Systems","volume":"4","author":"Allahham","year":"2018"},{"article-title":"Assessing smart home security : a Zigbee case study","year":"2022","author":"Jansen","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"ref11","first-page":"195","article-title":"IoT Goes Nuclear: Creating a ZigBee Chain Reaction","volume-title":"2017 IEEE Symposium on Security and Privacy (SP).","author":"Ronen"},{"key":"ref12","first-page":"1","article-title":"New Replay Attacks on ZigBee Devices for Internet-of-Things (IoT) Applications","volume-title":"2020 IEEE International Conference on Embedded Software and Systems (ICESS).","author":"Wara"},{"author":"Thiery","key":"ref13","article-title":"Privacy implications of switching ON a light bulb in the IoT world"},{"key":"ref14","first-page":"e6731783","article-title":"ZPA: A Smart Home Privacy Analysis System Based on ZigBee Encrypted Traffic","volume-title":"Wireless Communications and Mobile Computing","volume":"2023","author":"Li","year":"2023"},{"key":"ref15","first-page":"101675","article-title":"Privacy invasion via smart-home hub in personal area networks","volume-title":"Pervasive and Mobile Computing","volume":"85","author":"Setayeshfar","year":"2022"}],"event":{"name":"2024 20th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2024,10,28]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 20th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10814115\/10814268\/10814609.pdf?arnumber=10814609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T08:14:59Z","timestamp":1735719299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10814609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/cnsm62983.2024.10814609","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}