{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:27:16Z","timestamp":1765268836357,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833870","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T16:14:47Z","timestamp":1658765687000},"page":"208-214","source":"Crossref","is-referenced-by-count":4,"title":["BLE-Doubt: Smartphone-Based Detection of Malicious Bluetooth Trackers"],"prefix":"10.1109","author":[{"given":"Jimmy","family":"Briggs","sequence":"first","affiliation":[{"name":"Unaffiliated"}]},{"given":"Christine","family":"Geeng","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"263","reference":[{"year":"2021","key":"ref10","article-title":"A. Airtag"},{"year":"2021","key":"ref11","article-title":"A. Apple Introduces AirTag"},{"year":"2022","key":"ref12","article-title":"A. Tracker Detect"},{"key":"ref13","first-page":"1","article-title":"Privacy threats in intimate relationships","volume":"6","author":"levy","year":"0","journal-title":"Cybersecurity"},{"key":"ref14","article-title":"Are Apple AirTags Being Used to Track People and Steal Cars","author":"mac","year":"2021","journal-title":"The New York Times"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195902001006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"ref17","article-title":"Should We Be Freaked Out About Tile, the World&#x2019;s Cheapest New Location Tracker?","author":"mcguire","year":"2013","journal-title":"Vice"},{"article-title":"Android beacon library","year":"2019","author":"networks","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s17050951"},{"article-title":"Bluetooth core specification v5","year":"2019","author":"woolley","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3115\/1072017.1072026"},{"article-title":"Bluetooth technnology protecting your privacy","year":"2015","author":"woolley","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.7000963"},{"key":"ref6","article-title":"Apple&#x2019;s AirTag trackers made it frighteningly easy to &#x2018;stalk&#x2019; me in a test","author":"fowler","year":"2021","journal-title":"The Washington Post"},{"key":"ref5","article-title":"Apple AirTags - &#x2019;A perfect tool for stalking&#x2019;","author":"clayton","year":"2022","journal-title":"BBC"},{"key":"ref8","first-page":"1","article-title":"A Stalker&#x2019;s Paradise: How Intimate Partner Abusers Exploit Technology","author":"freed","year":"2018","journal-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI &#x2019;18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-6988.2010.01051.x"},{"key":"ref2","article-title":"Thermostats, Locks and Lights: Digital Tools of Domestic Abuse","author":"bowles","year":"2018","journal-title":"The New York Times"},{"key":"ref9","first-page":"2857a","volume":"23","author":"hocking","year":"1988","journal-title":"Topology ( 1961)"},{"article-title":"AirGuard - AirTag tracking protection","year":"2022","author":"bittner","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2789(99)00228-6"},{"article-title":"nRF Connect for Mobile","year":"2021","author":"semiconductor","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.20465\/KIOTS.2016.2.2.021"},{"year":"2021","key":"ref24","article-title":"Battery Life - Tile Support"},{"key":"ref23","first-page":"83","article-title":"Safe at home: Towards a feminist critique of cybersecurity","volume":"15","author":"slupska","year":"2019","journal-title":"St Antony&#x2019;s International Review"},{"key":"ref26","article-title":"How to search for Apple&#x2019;s helpful &#x2014; and unsettling &#x2014; AirTag trackers - The Washington Post","author":"velazco","year":"2021","journal-title":"The Washington Post"},{"key":"ref25","first-page":"1893","article-title":"The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums","author":"tseng","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833870.pdf?arnumber=9833870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T16:02:34Z","timestamp":1660579354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833870","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}