{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:44Z","timestamp":1759133504539},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.5220\/0006375701670177","type":"proceedings-article","created":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T12:40:35Z","timestamp":1494506435000},"page":"167-177","source":"Crossref","is-referenced-by-count":2,"title":["Device Fingerprinting: Analysis of Chosen Fingerprinting Methods"],"prefix":"10.5220","author":[{"given":"Anna","family":"Kobusi\u0144ska","sequence":"first","affiliation":[{"name":"Pozna\u0144 University of Technology, Poland"}]},{"given":"Jerzy","family":"Brzezi\u0144ski","sequence":"first","affiliation":[{"name":"Pozna\u0144 University of Technology, Poland"}]},{"given":"Kamil","family":"Pawulczuk","sequence":"first","affiliation":[{"name":"Pozna\u0144 University of Technology, Poland"}]}],"member":"3171","event":{"name":"2nd International Conference on Internet of Things, Big Data and Security","start":{"date-parts":[[2017,4,24]]},"location":"Porto, Portugal","end":{"date-parts":[[2017,4,26]]}},"container-title":["Proceedings of the  2nd International Conference on Internet of Things, Big Data and Security"],"original-title":["Device Fingerprinting: Analysis of Chosen Fingerprinting Methods"],"deposited":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T12:40:40Z","timestamp":1494506440000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0006375701670177"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0006375701670177","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}