{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:19:07Z","timestamp":1771298347461,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/ccoms.2019.8821711","type":"proceedings-article","created":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:45:06Z","timestamp":1567460706000},"page":"664-668","source":"Crossref","is-referenced-by-count":11,"title":["Vulnerabilities in IoT Devices with Software-Defined Radio"],"prefix":"10.1109","author":[{"given":"Phan Duy","family":"Hung","sequence":"first","affiliation":[]},{"given":"Bui Trong","family":"Vinh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0"},{"key":"ref11","year":"0"},{"key":"ref12","year":"0"},{"key":"ref13","year":"0"},{"key":"ref4","article-title":"Jamming attack in WSN: a spatial perspective","author":"yanqiang","year":"0","journal-title":"UbiComp '11 Proceedings of the 13th international conference on Ubiquitous computing"},{"key":"ref3","article-title":"Injection attacks on 802.11n MAC frame aggregation","author":"pieter","year":"0","journal-title":"WiSec '15 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks"},{"key":"ref6","first-page":"89","article-title":"Attacks on physical-layer identification","author":"boris","year":"2010","journal-title":"The third ACM conference on Wireless network security (WiSec '10)"},{"key":"ref5","first-page":"12","article-title":"Assessing security risk for wireless sensor networks under cyberattack","author":"brian","year":"2018","journal-title":"Proceedings of the Annual Simulation Symposium (ANSS '18)Society for Computer Simulation International"},{"key":"ref8","first-page":"69","article-title":"Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure","author":"da-zhi","year":"2018","journal-title":"Personal and Ubiquitous Computing"},{"key":"ref7","article-title":"How privacy leaks from bluetooth mouse?","author":"xian","year":"0","journal-title":"CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security"},{"key":"ref2","article-title":"Evaluating resistance to jamming and casual interception in mobile wireless networks","author":"lucia","year":"0","journal-title":"October 2012 MSWiM '12 Proceedings of the 15th ACM international conference on Modeling analysis and simulation of wireless and mobile systems"},{"key":"ref1","article-title":"Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks","author":"daniel","year":"2018","journal-title":"WiSec '18 Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks"},{"key":"ref9","article-title":"Exploring security in ZigBee networks","author":"lindsey","year":"0","journal-title":"Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14"}],"event":{"name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","location":"Singapore","start":{"date-parts":[[2019,2,23]]},"end":{"date-parts":[[2019,2,25]]}},"container-title":["2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811523\/8821628\/08821711.pdf?arnumber=8821711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:13:41Z","timestamp":1657840421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8821711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccoms.2019.8821711","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}