{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T09:09:07Z","timestamp":1725959347350},"reference-count":67,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T00:00:00Z","timestamp":1504656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.<\/jats:p>","DOI":"10.3390\/s17092043","type":"journal-article","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T15:23:34Z","timestamp":1504711414000},"page":"2043","source":"Crossref","is-referenced-by-count":90,"title":["Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9949-6664","authenticated-orcid":false,"given":"Muhammad","family":"Ehatisham-ul-Haq","sequence":"first","affiliation":[{"name":"Faculty of Telecom and Information Engineering, University of Engineering and Technology, Taxila, Punjab 47050, Pakistan"}]},{"given":"Muhammad Awais","family":"Azam","sequence":"additional","affiliation":[{"name":"Faculty of Telecom and Information Engineering, University of Engineering and Technology, Taxila, Punjab 47050, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4968-993X","authenticated-orcid":false,"given":"Jonathan","family":"Loo","sequence":"additional","affiliation":[{"name":"School of Computing and Engineering, University of West London, London W5 5RF, UK"}]},{"given":"Kai","family":"Shuang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Syed","family":"Islam","sequence":"additional","affiliation":[{"name":"School of Architecture, Computing and Engineering, University of East London, London E16 2RD, UK"}]},{"given":"Usman","family":"Naeem","sequence":"additional","affiliation":[{"name":"School of Architecture, Computing and Engineering, University of East London, London E16 2RD, UK"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2197-8126","authenticated-orcid":false,"given":"Yasar","family":"Amin","sequence":"additional","affiliation":[{"name":"Faculty of Telecom and Information Engineering, University of Engineering and Technology, Taxila, Punjab 47050, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2017,9,6]]},"reference":[{"key":"ref_1","unstructured":"(2017, August 08). The Statistics Portal. Available online: http:\/\/www.statista.com\/statistics\/274774\/forecast-of-mobile-phone-users-worldwide."},{"key":"ref_2","unstructured":"(2017, August 08). Gartner Says Worldwide PC, Tablet and Mobile Phone Combined Shipments to Reach 2.4 Billion Units in 2013, a Press Release Published April 4, 2013. Available online: http:\/\/www.gartner.com\/newsroom\/id\/2408515."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MSP.2015.67","article-title":"Biometric Authentication on Mobile Devices","volume":"13","author":"Mayron","year":"2015","journal-title":"IEEE Secur. Priv."},{"key":"ref_4","unstructured":"(2017, August 08). Data Genetics: Pin Analysis. Available online: http:\/\/www.datagenetics.com\/blog\/september32013."},{"key":"ref_5","unstructured":"(2017, August 08). SRLabs: Spoofing Fingerprints. Available online: https:\/\/srlabs.de\/spoofing-fingerprints."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Shukla, D., Kumar, R., Serwadda, A., and Phoha, V.V. (2014, January 3\u20137). Beware, your hands reveal your secrets!. Proceedings of the CCS-ACM Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660360"},{"key":"ref_7","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M. (2010, January 11\u201313). Smudge attacks on smartphone touch screens. Proceedings of the 4th USENIX Conference on Offensive Technologies, Washington, DC, USA."},{"key":"ref_8","first-page":"184","article-title":"KeySens\u202f: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction","volume":"130","author":"Draffin","year":"2014","journal-title":"Mob. Comput. Appl. Serv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","article-title":"Authentication of smartphone users using behavioral biometrics","volume":"18","author":"Alzubaidi","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","unstructured":"Gafurov, D. (2007, January 19\u201321). A survey of biometric gait recognition: Approaches, security and challenges. Proceedings of the Norwegian Informatics Conference, Oslo, Norway."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/TMC.2014.2341633","article-title":"Unlocking Smart Phone through Handwaving Biometrics","volume":"14","author":"Yang","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-642-21726-5_12","article-title":"Speakersense: Energy efficient unobtrusive speaker identification on mobile phones","volume":"Volume 6696","author":"Lu","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Blanco-Gonzalo, R., Miguel-Hurtado, O., Mendaza-Ormaza, A., and Sanchez-Reillo, R. (2012, January 15\u201318). Handwritten signature recognition in mobile scenarios: Performance evaluation. Proceedings of the International Carnahan Conference on Security Technology, Boston, MA, USA.","DOI":"10.1109\/CCST.2012.6393554"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","author":"Frank","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., and Wang, H. (2014, January 21\u201324). You are how you touch: User verification on smartphones via tapping behaviors. Proceedings of the International Conference on Network Protocols, ICNP, Raleigh, NC, USA.","DOI":"10.1109\/ICNP.2014.43"},{"key":"ref_16","first-page":"187","article-title":"Silentsense: Silent user identification via dynamics of touch and movement behavioral biometrics","volume":"13","author":"Bo","year":"2013","journal-title":"MobiCom"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","article-title":"HMOG: New behavioral biometric features for continuous authentication of smartphone users","volume":"11","author":"Sitova","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/ACCESS.2016.2557846","article-title":"Learning Human Identity from Motion Patterns","volume":"4","author":"Neverova","year":"2016","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3295","DOI":"10.1109\/TPDS.2013.2297309","article-title":"Sherlock: Micro-environment sensing for smartphones","volume":"25","author":"Yang","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Shoaib, M., Scholten, H., and Havinga, P.J.M. (2013, January 18\u201321). Towards physical activity recognition using smartphone sensors. Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted, Vietri sul Mere, Italy.","DOI":"10.1109\/UIC-ATC.2013.43"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"10146","DOI":"10.3390\/s140610146","article-title":"Fusion of smartphone motion sensors for physical activity recognition","volume":"14","author":"Shoaib","year":"2014","journal-title":"Sensors"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Consolvo, S., McDonald, D.W., Toscos, T., Chen, M.Y., Froehlich, J., Harrison, B., Klasnja, P., LaMarca, A., LeGrand, L., and Libby, R. (2008, January 5\u201310). Activity sensing in the wild: A field trial of UbiFit Garden. Proceedings of the 2008 Conference on Human Factors in Computing Systems, Florence, Italy.","DOI":"10.1145\/1357054.1357335"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., and Campbell, A.T. (2008, January 5\u20137). Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. Proceedings of the 6th ACM Conference on Embedded Networked Sensor Systems, Raleigh, NC, USA.","DOI":"10.1145\/1460412.1460445"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/SURV.2012.031412.00077","article-title":"Mobile phone sensing systems: A survey","volume":"15","author":"Khan","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TST.2014.6838194","article-title":"Activity recognition with smartphone sensors","volume":"19","author":"Su","year":"2014","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2002.1037719","article-title":"Activity and location recognition using wearable sensors","volume":"1","author":"Lee","year":"2002","journal-title":"IEEE Pervasive Comput."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bao, L., and Intille, S.S. (2004). Activity recognition from user-annotated acceleration data. Pervasive Comput., 1\u201317.","DOI":"10.1007\/978-3-540-24646-6_1"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1258\/135763304323070788","article-title":"A pilot study of long-term monitoring of human movements in the home using accelerometry","volume":"10","author":"Mathie","year":"2004","journal-title":"J. Telemed. Telecare"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2499621","article-title":"A tutorial on human activity recognition using body-worn inertial sensors","volume":"1","author":"Bulling","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"ref_30","unstructured":"Pl\u00f6tz, T., Hammerla, N.Y., and Olivier, P. (2011, January 16\u201322). Feature learning for activity recognition in ubiquitous computing. Proceeding of the Twenty-Second International Joint Conference on Artificial Intelligence, Barcelona, Spain."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Shoaib, M., Bosch, S., Incel, O.D., Scholten, H., and Havinga, P.J.M. (2016). Complex human activity recognition using smartphone and wrist-worn motion sensors. Sensors, 16.","DOI":"10.3390\/s16040426"},{"key":"ref_32","first-page":"5","article-title":"Darwin Phones\u202f: The Evolution of Sensing and Inference on Mobile Phones","volume":"14","author":"Miluzzo","year":"2010","journal-title":"Darwin"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1964897.1964918","article-title":"Activity recognition using cell phone accelerometers","volume":"12","author":"Kwapisz","year":"2011","journal-title":"ACM SIGKDD Explor."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Mun, M., Boda, P., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., and West, R. (2009, January 22\u201325). PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, Krak\u00f3w, Poland.","DOI":"10.1145\/1555816.1555823"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Shoaib, M., Bosch, S., Scholten, H., Havinga, P.J.M., and Incel, O.D. (2015, January 23\u201327). Towards detection of bad habits by fusing smartphone and smartwatch sensors. Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops, St. Louis, MO, USA.","DOI":"10.1109\/PERCOMW.2015.7134104"},{"key":"ref_36","unstructured":"Moya, M.M., Koch, M.W., and Hostetler, L. (1993). One-Class Classifier Networks for Target Recognition Applications, DOE. Technical Report SAND-93-0084C."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Trojahn, M., and Ortmeier, F. (2013, January 25\u201328). Toward mobile authentication with keystroke dynamics on mobile phones and tablets. Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain.","DOI":"10.1109\/WAINA.2013.36"},{"key":"ref_38","unstructured":"Kohavi, R. (1996, January 2\u20134). Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid. Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Oregon, Portland."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1007465528199","article-title":"Bayesian Network Classifiers","volume":"29","author":"Friedman","year":"1997","journal-title":"Mach. Learn."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/72.159058","article-title":"Multilayer perceptron, fuzzy sets, and classification","volume":"3","author":"Pal","year":"1992","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-319-02937-5_11","article-title":"Wave-to-access: Protecting sensitive mobile device services via a hand waving gesture","volume":"Volume 8257","author":"Shrestha","year":"2013","journal-title":"Lecture Notes in Computer Science"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-Vector Networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1016\/S0893-6080(97)00002-6","article-title":"An Efficient Method to Construct a Radial Basis Function Neural Network Classifier","volume":"10","author":"Hwang","year":"1997","journal-title":"Neural Netw."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Feng, T., Zhao, X., Carbunar, B., and Shi, W. (2013, January 16\u201318). Continuous mobile authentication using virtual key typing biometrics. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia.","DOI":"10.1109\/TrustCom.2013.272"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1080\/01431160412331269698","article-title":"Random forest classifier for remote sensing classification","volume":"26","author":"Pal","year":"2005","journal-title":"Int. J. Remote Sens."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., and Greer, K. (2003, January 3\u20137). kNN Model-Based Approach in Classification. Proceedings of the OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2003, Catania, Sicily, Italy.","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref_47","unstructured":"Shahzad, M., Liu, A.X., and Samuel, A. (October, January 30). Secure unlocking of mobile touch screen devices by simple gestures\u2014You can see it but you can not do it. Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, Miami, FL, USA."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Derawi, M.O., Nickely, C., Bours, P., and Busch, C. (2010, January 15\u201317). Unobtrusive user-authentication on mobile phones using biometric gait recognition. Proceedings of the 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany.","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/s10115-004-0154-9","article-title":"Exact indexing of dynamic time warping","volume":"7","author":"Keogh","year":"2005","journal-title":"Knowl. Inf. Syst."},{"key":"ref_50","unstructured":"M\u00e4ntyj\u00e4rvi, J., Lindholm, M., Vildjiounaite, E., M\u00e4kel\u00e4, S.M., and Ailisto, H. (2005, January 23). Identifying users of portable devices from gait pattern with accelerometers. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (2005 ICASSP), Philadelphia, PA, USA."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1108\/09685220710759559","article-title":"The application of signature recognition to transparent handwriting verification for mobile devices","volume":"15","author":"Clarke","year":"2007","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/TIFS.2014.2316472","article-title":"Online signature verification on mobile devices","volume":"9","author":"Memon","year":"2014","journal-title":"Inf. Forensics Secur. IEEE Trans."},{"key":"ref_53","unstructured":"Kunz, M., Kasper, K., Reininger, H., M\u00f6bius, M., and Ohms, J. (2011, January 8\u20139). Continuous speaker verification in realtime. Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Darmstadt, Germany."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","article-title":"A tutorial on hidden Markov models and selected applications in speech recognition","volume":"77","author":"Rabiner","year":"1989","journal-title":"Proc. IEEE"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Das, A., Manyam, O.K., Tapaswi, M., and Taranalli, V. (2008, January 15\u201319). Multilingual spoken-password based user authentication in emerging economies using cellular phone networks. Proceedings of the 2008 IEEE Workshop on Spoken Language Technology, Goa, India.","DOI":"10.1109\/SLT.2008.4777826"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1002\/sec.1061","article-title":"Introducing touchstroke: Keystroke-based authentication system for smartphones","volume":"9","author":"Kambourakis","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_57","unstructured":"Zhu, J., Wu, P., Wang, X., and Zhang, J. (2013, January 28\u201331). SenSec: Mobile security through passive sensing. Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC 2013), San Diego, CA, USA."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/978-3-642-16355-5_42","article-title":"Activity recognition on an accelerometer embedded mobile phone with varying positions and orientations","volume":"Volume 6406","author":"Sun","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Anjum, A., and Ilyas, M.U. (2013, January 11\u201314). Activity recognition using smartphone sensors. Proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2013.6488584"},{"key":"ref_60","unstructured":"Anguita, D., Ghio, A., Oneto, L., Parra, X., and Reyes-Ortiz, J.L. (2013, January 24\u201326). A public domain dataset for human activity recognition using smartphones. Proceedings of the 21th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgium."},{"key":"ref_61","unstructured":"Alpayd\u0131n, E. (2012). Introduction to Machine Learning, MIT Press."},{"key":"ref_62","unstructured":"Platt, J.C. (2017, August 08). Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines. Available online: http:\/\/www.microsoft.com\/en-us\/research\/publication\/sequential-minimal-optimization-a-fast-algorithm-for-training-support-vector-machines\/#."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"100","DOI":"10.2307\/2346830","article-title":"A K-means clustering algorithm","volume":"28","author":"Hartigan","year":"1979","journal-title":"Appl. Stat."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Kaufman, L., and Rousseeuw, P.J. (1990). Finding Groups in Data: An Introduction to Cluster Analysis, Wiley-Interscience.","DOI":"10.1002\/9780470316801"},{"key":"ref_65","first-page":"298","article-title":"Comparative analysis & amp; evaluation of euclidean distance function and manhattan distance function using K-means algorithm","volume":"2","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Dobbin, K.K., and Simon, R.M. (2011). Optimally splitting cases for training and testing high dimensional classifiers. BMC Med. Genom., 4.","DOI":"10.1186\/1755-8794-4-31"},{"key":"ref_67","unstructured":"Wannenburg, J., and Malekian, R. (2016). Physical activity recognition from smartphone accelerometer data for user context awareness sensing. IEEE Trans. Syst. Man Cybern. Syst., 1\u20138."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2043\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T12:47:16Z","timestamp":1717850836000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,6]]},"references-count":67,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["s17092043"],"URL":"https:\/\/doi.org\/10.3390\/s17092043","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,6]]}}}