{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:51Z","timestamp":1761402051714},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/globecom38437.2019.9014318","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T04:59:24Z","timestamp":1582865964000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-Time"],"prefix":"10.1109","author":[{"given":"Sopan","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Jovanov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2016.7785169"},{"key":"ref11","first-page":"1205","article-title":"Protecting privacy of BLE device users","author":"fawaz","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref12","first-page":"377","article-title":"Bluetooth network-based misuse detection","author":"connor","year":"0","journal-title":"2008 Annual Computer Security Applications Conference (ACSAC)"},{"journal-title":"Frontline test equipment","year":"0","key":"ref13"},{"journal-title":"Bluefruit LE Sniffer","year":"0","key":"ref14"},{"journal-title":"Cysmart - bluetooth le test and debug tool","year":"0","key":"ref15"},{"journal-title":"SmartRF Protocol Packet Sniffer","year":"0","key":"ref16"},{"key":"ref17","article-title":"Bluetooth: With low energy comes low security","author":"ryan","year":"0","journal-title":"7th USENIX Workshop on Offensive Technologies"},{"journal-title":"Ubertooth one","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906403"},{"journal-title":"The Statisticain","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s17071467"},{"journal-title":"BlueBorne","year":"2017","author":"seri","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.63"},{"key":"ref7","first-page":"1","article-title":"Analysis of bluetooth threats and v4. 0 security features","author":"sandhya","year":"0","journal-title":"2012 International Conference on Computing Communication and Applications"},{"key":"ref2","first-page":"1","article-title":"Evaluating bluetooth low energy in realistic wireless environments","author":"al kalaa","year":"0","journal-title":"2016 IEEE Wireless Communications and Networking Conference"},{"journal-title":"Bluetooth core specification v5 1","year":"2019","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"ref22","first-page":"2210","article-title":"Cracking the tsch channel hopping in ieee 802.15. 4e","author":"cheng","year":"0","journal-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.03.006"},{"journal-title":"Bluetooth smart psoc 4","year":"0","key":"ref24"},{"journal-title":"Linear Congruential Generators","year":"0","key":"ref23"}],"event":{"name":"GLOBECOM 2019 - 2019 IEEE Global Communications Conference","start":{"date-parts":[[2019,12,9]]},"location":"Waikoloa, HI, USA","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8968653\/9013108\/09014318.pdf?arnumber=9014318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:55:26Z","timestamp":1658080526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9014318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/globecom38437.2019.9014318","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}