{"id":"https://openalex.org/W2104681679","doi":"https://doi.org/10.1109/issa.2015.7335048","title":"Intrusion detection in Bluetooth enabled mobile phones","display_name":"Intrusion detection in Bluetooth enabled mobile phones","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2104681679","doi":"https://doi.org/10.1109/issa.2015.7335048","mag":"2104681679"},"language":"en","primary_location":{"id":"doi:10.1109/issa.2015.7335048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059467916","display_name":"Kishor Krishnan Nair","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Kishor Krishnan Nair","raw_affiliation_strings":["Council for Scientific and Industrial Research (CSIR), Modelling and Digital Science (MDS), Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Council for Scientific and Industrial Research (CSIR), Modelling and Digital Science (MDS), Pretoria, South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058669222","display_name":"A.S.J. Helberg","orcid":"https://orcid.org/0000-0001-6833-5163"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Albert Helberg","raw_affiliation_strings":["Faculty of Engineering, North-West University, South Africa","Faculty of Engineering, Telkom Centre of Excellence, North-West University, Potchefstroom Campus, South Africa"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, North-West University, South Africa","institution_ids":["https://openalex.org/I27765905"]},{"raw_affiliation_string":"Faculty of Engineering, Telkom Centre of Excellence, North-West University, Potchefstroom Campus, South Africa","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054777418","display_name":"Johan van der Merwe","orcid":"https://orcid.org/0000-0003-3579-654X"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Johan Van Der Merwe","raw_affiliation_strings":["Council for Scientific and Industrial Research (CSIR), Modelling and Digital Science (MDS), Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Council for Scientific and Industrial Research (CSIR), Modelling and Digital Science (MDS), Pretoria, South Africa","institution_ids":["https://openalex.org/I21360634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059467916"],"corresponding_institution_ids":["https://openalex.org/I21360634"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65475058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6 858","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.9444142580032349},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6865584850311279},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6832296252250671},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6260417699813843},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5383371710777283},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5227104425430298},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48035845160484314},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4376174211502075},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28255990147590637},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11579394340515137}],"concepts":[{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.9444142580032349},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6865584850311279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6832296252250671},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6260417699813843},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5383371710777283},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5227104425430298},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48035845160484314},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4376174211502075},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28255990147590637},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11579394340515137}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/issa.2015.7335048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2015.7335048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Information Security for South Africa (ISSA)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.nwu.ac.za:10394/19970","is_oa":false,"landing_page_url":"http://hdl.handle.net/10394/19970","pdf_url":null,"source":{"id":"https://openalex.org/S4306402268","display_name":"Boloka Institutional Repository (North-west University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114027177","host_organization_name":"University of North Carolina at Chapel Hill","host_organization_lineage":["https://openalex.org/I114027177"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Presentation"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W44223481","https://openalex.org/W66730639","https://openalex.org/W1498408795","https://openalex.org/W1547253197","https://openalex.org/W1550136757","https://openalex.org/W1590099998","https://openalex.org/W1599925893","https://openalex.org/W1992820542","https://openalex.org/W2012701999","https://openalex.org/W2036116878","https://openalex.org/W2100278298","https://openalex.org/W2120791962","https://openalex.org/W2121372682","https://openalex.org/W2140391951","https://openalex.org/W2182686846","https://openalex.org/W2313917100","https://openalex.org/W2336683095","https://openalex.org/W2622610444","https://openalex.org/W2912060910","https://openalex.org/W6677689219","https://openalex.org/W6680300928"],"related_works":["https://openalex.org/W4220926637","https://openalex.org/W4242093584","https://openalex.org/W2365945961","https://openalex.org/W2369540926","https://openalex.org/W2048100608","https://openalex.org/W2090296580","https://openalex.org/W1576249345","https://openalex.org/W4243905374","https://openalex.org/W2785815065","https://openalex.org/W1796074903"],"abstract_inverted_index":{"Bluetooth":[0,16,26,29,106,134,185,199],"plays":[1],"a":[2,111,184],"major":[3],"role":[4],"in":[5,52,102,178],"expanding":[6],"global":[7],"spread":[8],"of":[9,24,80,131],"wireless":[10],"technology.":[11],"This":[12,189],"predominantly":[13],"happens":[14],"through":[15,44],"enabled":[17],"mobile":[18,30,42,53,64,77,95,203],"phones,":[19,54],"which":[20,99],"cover":[21],"almost":[22],"60%":[23],"the":[25,68,94,104,122,128,150,170,193,198,202,206],"market.":[27],"Although":[28],"phones":[31,43],"are":[32],"equipped":[33,182],"with":[34,183],"built-in":[35],"security":[36,46,88,124,172,194],"modes":[37],"and":[38,48,136,153,158,162,176,205],"policies,":[39],"intruders":[40],"compromise":[41],"existing":[45,171],"vulnerabilities":[47],"limitations.":[49],"Information":[50],"stored":[51],"whether":[55],"it":[56,180],"is":[57,61,84,100,110,174,181],"personal":[58],"or":[59,144],"corporate,":[60],"significant":[62],"to":[63,70,141,160,169],"phone":[65,78,204],"users.":[66],"Hence,":[67],"need":[69],"protect":[71],"information,":[72],"as":[73,75],"well":[74],"alert":[76],"users":[79,129],"their":[81,132],"incoming":[82,133],"connections,":[83],"vital.":[85],"An":[86],"additional":[87],"mechanism":[89,112],"was":[90],"therefore":[91],"conceptualized,":[92],"at":[93],"phone's":[96],"user":[97],"level,":[98],"essential":[101],"improving":[103],"security.":[105],"Logging":[107],"Agent":[108],"(BLA)":[109],"that":[113,179],"has":[114],"been":[115],"developed":[116],"for":[117],"this":[118],"purpose.":[119],"It":[120],"alleviates":[121],"current":[123],"issues":[125],"by":[126,196],"making":[127],"aware":[130],"connections":[135],"gives":[137],"them":[138],"an":[139],"option":[140],"either":[142],"accept":[143],"reject":[145],"these":[146],"connections.":[147,165],"Besides":[148],"this,":[149],"intrusion":[151],"detection":[152],"verification":[154],"module":[155,191],"uses":[156],"databases":[157],"rules":[159],"authenticate":[161],"verify":[163],"all":[164],"BLA":[166],"when":[167],"compared":[168],"solutions":[173],"novel":[175],"unique":[177],"message":[186],"logging":[187,190],"module.":[188],"reduces":[192],"risks":[195],"monitoring":[197],"communication":[200],"between":[201],"remote":[207],"device.":[208]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
