{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:14:37Z","timestamp":1730279677642,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iwqos.2016.7590453","type":"proceedings-article","created":{"date-parts":[[2016,10,17]],"date-time":"2016-10-17T16:40:56Z","timestamp":1476722456000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["The detection of physical attacks against iBeacon transmitters"],"prefix":"10.1109","author":[{"family":"Chenhao Liu","sequence":"first","affiliation":[]},{"family":"Peng Zhao","sequence":"additional","affiliation":[]},{"family":"Kaigui Bian","sequence":"additional","affiliation":[]},{"family":"Tong Zhao","sequence":"additional","affiliation":[]},{"family":"Yan Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2014","key":"ref10","article-title":"Introduction of governor"},{"year":"2014","key":"ref11","article-title":"Delivering on the promise of beacons: a modular approach"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1994.315935"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref17","article-title":"Probabilistic approach for location-based authentication","volume":"2007","author":"lehtonen","year":"2007","journal-title":"1 st Internationalworkshop on security for spontaneous interaction IWSSI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44999-7_23"},{"key":"ref19","first-page":"10","article-title":"Ensemble learning for intrusion detection in computer networks","author":"didaci","year":"2002","journal-title":"Proceedings of the Workshop on Machine Learning Methods and Applications held in the context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI* IA)"},{"article-title":"ibeacon part 6: Beyond retail","year":"2014","author":"gast","key":"ref4"},{"year":"2014","key":"ref3","article-title":"7 companies embracing ibeacon technology"},{"article-title":"Hacking the ces scavenger hunt","year":"2014","author":"allan","key":"ref6"},{"article-title":"10 things ibeacons could transform that have nothing to do with retail","year":"2013","author":"faas","key":"ref5"},{"article-title":"The stolen beacon","year":"2014","author":"terraz","key":"ref8"},{"year":"2014","key":"ref7","article-title":"Getting started with ibeacon"},{"article-title":"ibeacon\/ble beacon shipments to break 60 million by 2019, says abi research","year":"2014","author":"gallen","key":"ref2"},{"article-title":"Mobile commerce: ibeacon vs. nfc","year":"2014","author":"bustos","key":"ref1"},{"article-title":"ibeacon security: understanding the risks","year":"2014","author":"gilchrist","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_12"},{"article-title":"Ideal beacon placement","year":"2014","author":"steczkiewicz","key":"ref21"}],"event":{"name":"2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2016,6,20]]},"location":"Beijing, China","end":{"date-parts":[[2016,6,21]]}},"container-title":["2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7584862\/7590385\/07590453.pdf?arnumber=7590453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T09:54:16Z","timestamp":1479290056000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7590453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2016.7590453","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}