{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:45:48Z","timestamp":1759092348514},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142918"},{"type":"electronic","value":"9783642142925"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14292-5_26","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T09:51:13Z","timestamp":1277805073000},"page":"241-253","source":"Crossref","is-referenced-by-count":2,"title":["Mining Bluetooth Attacks in Smart Phones"],"prefix":"10.1007","author":[{"given":"Seyed Morteza","family":"Babamir","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Reyhane","family":"Nowrouzi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Hadi","family":"Naseri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Brenner, B.: Mobile Carriers Admit to Malware Attacks (2007), \n                    \n                      http:\/\/searchsecurity.techtarget.com\/news\/article\/0,289142,sid14_gci1243513,00.html"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Padgette, J.: Guide to Bluetooth Security, NIST Special Publication 800-121, National Institute of Standards and Technology (2008)","DOI":"10.6028\/NIST.SP.800-121"},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/1467247.1467282","volume":"52","author":"A. Loo","year":"2009","unstructured":"Loo, A.: Security Threats of Smart Phones and Bluetooth. Communications of ACM\u00a052(3), 150\u2013152 (2009)","journal-title":"Communications of ACM"},{"key":"26_CR4","unstructured":"Herfurt, M.: Bluesnarfing @ CeBIT 2004 - Detecting and attacking Bluetooth-enabled cell phones at the Hannover Fairground, pp. 1\u201312 (2004), \n                    \n                      http:\/\/trifinite.org\/Downloads\/BlueSnarf_CeBIT2004.pdf"},{"key":"26_CR5","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use","author":"K. Jensen","year":"2003","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, 2nd edn. Springer, Heidelberg (2003)","edition":"2"},{"key":"26_CR6","unstructured":"http:\/\/wiki.daimi.au.dk\/cpntools\/cpntools.wiki"},{"issue":"5","key":"26_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1127577.1127583","volume":"33","author":"M. Moffie","year":"2005","unstructured":"Moffie, M., Kaeli, D.: Application Security Monitor, Special Issue on the workshop on binary instrumentation and application. ACM SIGARCH Computer Architecture News\u00a033(5), 21\u201326 (2005)","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"26_CR8","first-page":"1","volume-title":"Proceedings of the 3rd International Workshop on Software Engineering for Security Systems (SESS\u201907)","author":"D. Vanoverberghe","year":"2007","unstructured":"Vanoverberghe, D., Piessens, F.: Supporting security monitor-aware development. In: Proceedings of the 3rd International Workshop on Software Engineering for Security Systems (SESS\u201907), USA, pp. 1\u20137. IEEE Computer Society, Los Alamitos (2007)"},{"key":"26_CR9","unstructured":"Babamir, S.M., Jalili, S.: A Logical Based Approach to Detection of Intrusions against Programs. In: Proceedings of the 2nd International Conference on Global E-Security, London, pp. 72\u201379 (2006)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Tuohimaa, S., Leppanen, V.: A Compact Aspect-Based Security Monitor for J2ME applications. In: Proceedings of International Conference on Computer System and Technologies-CompSysTech\u201907, USA. ACM International Conference Proceeding Series, vol.\u00a0285, pp. VI.1.1\u2013VI.1.6 (2007)","DOI":"10.1145\/1330598.1330705"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/IAW.2007.381925","volume-title":"Proceedings of Information Assurance and Security Workshop","author":"T. Buennemeyer","year":"2007","unstructured":"Buennemeyer, T., Nelson, T., Gora, M., Marchany, R., Trong, J.: Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices. In: Proceedings of Information Assurance and Security Workshop, pp. 135\u2013142. IEEE Press, Los Alamitos (2007)"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/ACSAC.2008.39","volume-title":"Proceedings of Annual Computer Security Applications Conference, ACSAC 2008","author":"T. OConnor","year":"2008","unstructured":"OConnor, T., Reeves, T.: Bluetooth Network-Based Misuse Detection. In: Proceedings of Annual Computer Security Applications Conference, ACSAC 2008, USA, pp. 377\u2013391. IEEE Press, Los Alamitos (2008), doi:10.1109\/ACSAC.2008.39"},{"key":"26_CR13","unstructured":"http:\/\/trifinite.org"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14292-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:23:26Z","timestamp":1619771006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14292-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142918","9783642142925"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14292-5_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}