{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:30Z","timestamp":1730276490070,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335048","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion detection in Bluetooth enabled mobile phones"],"prefix":"10.1109","author":[{"given":"Kishor Krishnan","family":"Nair","sequence":"first","affiliation":[]},{"given":"Albert","family":"Helberg","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Van Der Merwe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"An Advanced Mututal-Authentication Algorithm Using 3-DES for Smart Card Systems","author":"tsague","year":"0","journal-title":"Proc of the 2nd International Conference on Cloud and Green Computing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067176"},{"key":"ref10","article-title":"Overview of Bluetooth Security, Bluetooth Security Attacks","author":"haataja","year":"2013","journal-title":"SpringerBriefs in Computer Science"},{"key":"ref11","article-title":"Guide to Bluetooth Technology","author":"scarfone","year":"2008","journal-title":"National Institute of Standards and Technology"},{"key":"ref12","volume":"6 858","author":"chai","year":"2012","journal-title":"Hacking Bluetooth"},{"key":"ref13","article-title":"Bluetooth&#x2122; Security White Paper","author":"gehrmann","year":"2002","journal-title":"Bluetooth SIG Security Expert Group"},{"journal-title":"The OSI Model Understanding the Seven Layers of Computer Networks","year":"2006","author":"simoneau","key":"ref14"},{"journal-title":"Security of Bluetooth An Overview of Bluetooth Security","year":"2000","author":"traskback","key":"ref15"},{"year":"2002","author":"morrow","key":"ref16"},{"journal-title":"Managing Mobility Enterprise Secure Wireless Control A Red-M Paper","article-title":"Red-M (Communications)","year":"2008","key":"ref17"},{"key":"ref18","article-title":"Bluetooth Networking for your Palm, Pocket PC and Computer","author":"gade","year":"2008","journal-title":"MobileTechReview"},{"journal-title":"Wireless Intrusion Detection Systems Including Incident Response & Wireless Policy","year":"2009","author":"dixon","key":"ref19"},{"year":"2013","key":"ref28","article-title":"Gold Lock 3G&#x2122;"},{"key":"ref4","article-title":"Mobile Enterprise","author":"banduni","year":"2006","journal-title":"Mobility and Security"},{"journal-title":"THE ULTIMATE OTECTIONYOU'RE YOUR MOBILE LIFE","article-title":"McAfee Mobile Security","year":"2015","key":"ref27"},{"key":"ref3","article-title":"Bluetooth And Its Inherent Security Issues","author":"niem","year":"2002","journal-title":"SANS GIAC Security Essentials Certification (GSEC) v1 4b"},{"key":"ref6","article-title":"New hack cracks secure Bluetooth Devices","author":"biever","year":"2005","journal-title":"New Scientist"},{"journal-title":"Sophos Mobile Security&#x2122;","year":"2014","key":"ref29"},{"key":"ref5","article-title":"Applying Packet Analysis as New Approach for Discovering Bluetooth Intrusion","author":"al-saadoon","year":"0","journal-title":"Proc of the 2011 ICICS Conference"},{"key":"ref8","article-title":"Secure Bluetooth for Trusted m-Commerce","author":"stirparol","year":"2013","journal-title":"Published online"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/9789812799562_0012"},{"journal-title":"Bluetooth Security Architecture Specification Version 1 0","year":"1999","author":"muller","key":"ref2"},{"journal-title":"Bluetooth&#x2122; Connect Without Cables","year":"2001","author":"bray","key":"ref9"},{"journal-title":"The Bluetooth Special Interest Group","article-title":"Bluetooth&#x00AE; Core Specification 4.2","year":"2015","key":"ref1"},{"journal-title":"Serious flaws in bluetooth security lead to disclosure of personal Data","year":"2003","author":"laurie","key":"ref20"},{"key":"ref22","article-title":"Case Study on the Bluetooth Vulnerabilities in Mobile Devices","author":"solon","year":"2006","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"article-title":"Bluetooth Hacking: A Case Study","year":"2010","author":"browning","key":"ref21"},{"journal-title":"MOBILE SECURITY FOR ENTERPRISES Gain visibility and control of mobile devices applications and data","article-title":"Trend Micro&#x2122;","year":"2014","key":"ref24"},{"key":"ref23","article-title":"Automated double firmware upgrade","author":"walston","year":"2009","journal-title":"US 8386643 B2"},{"year":"2015","key":"ref26","article-title":"F-SECURE SAFE"},{"journal-title":"MOBILE SECURITY FOR ENTERPRISES Gain visibility and control of mobile devices applications and data","article-title":"Trend Micro&#x2122;","year":"2014","key":"ref25"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335048.pdf?arnumber=7335048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:57:34Z","timestamp":1490417854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335048","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}