{"id":"https://openalex.org/W2563676116","doi":"https://doi.org/10.1109/milcom.2016.7795374","title":"Slowing the spread of Bluetooth-based malware in mobile tactical networks","display_name":"Slowing the spread of Bluetooth-based malware in mobile tactical networks","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2563676116","doi":"https://doi.org/10.1109/milcom.2016.7795374","mag":"2563676116"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2016.7795374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080341077","display_name":"Brian Thompson","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brian Thompson","raw_affiliation_strings":["U.S. Army Research Lab, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Lab, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063120551","display_name":"James Morris-King","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Morris-King","raw_affiliation_strings":["U.S. Army Research Lab, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Lab, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033809782","display_name":"Richard Harang","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Harang","raw_affiliation_strings":["U.S. Army Research Lab, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Lab, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080341077"],"corresponding_institution_ids":["https://openalex.org/I166416128"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73592293,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.9244080185890198},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8916342258453369},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7377593517303467},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.6903152465820312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6175168752670288},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46655720472335815},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.46385976672172546},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2685433626174927},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.24317020177841187}],"concepts":[{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.9244080185890198},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8916342258453369},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7377593517303467},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.6903152465820312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6175168752670288},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46655720472335815},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.46385976672172546},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2685433626174927},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.24317020177841187}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2016.7795374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W23621982","https://openalex.org/W202681721","https://openalex.org/W293678945","https://openalex.org/W1655226010","https://openalex.org/W1964241047","https://openalex.org/W1976978659","https://openalex.org/W1978136502","https://openalex.org/W1986379677","https://openalex.org/W1986576642","https://openalex.org/W2018049970","https://openalex.org/W2022034252","https://openalex.org/W2053101161","https://openalex.org/W2058559681","https://openalex.org/W2060537671","https://openalex.org/W2069273735","https://openalex.org/W2070722739","https://openalex.org/W2089217152","https://openalex.org/W2094534930","https://openalex.org/W2095240753","https://openalex.org/W2142145056","https://openalex.org/W2142864044","https://openalex.org/W2143244831","https://openalex.org/W2164463646","https://openalex.org/W2170341635","https://openalex.org/W2171112017","https://openalex.org/W2264042710","https://openalex.org/W2293893852","https://openalex.org/W2534754943","https://openalex.org/W2566862376","https://openalex.org/W2899541744","https://openalex.org/W4237627353","https://openalex.org/W6600976637","https://openalex.org/W6608330802","https://openalex.org/W6610462071","https://openalex.org/W6636991409","https://openalex.org/W6693088832","https://openalex.org/W6697333042","https://openalex.org/W6731457580","https://openalex.org/W6756264731"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W4245250093","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W2609233367","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"Cyber-attacks":[0],"in":[1,47,86],"mobile":[2,48],"tactical":[3,16,49],"networks":[4,50],"are":[5],"increasingly":[6],"being":[7],"recognized":[8],"as":[9,27],"a":[10,66],"threat":[11],"to":[12,29,69],"mission":[13],"assurance":[14],"and":[15,38,78],"capability.":[17],"Some":[18],"recent":[19],"cyber-attacks":[20],"have":[21],"exploited":[22],"short-range":[23],"radio":[24],"communication":[25],"such":[26,44],"Bluetooth":[28],"propagate":[30],"malware,":[31],"thereby":[32],"circumventing":[33],"traditional":[34],"cyber":[35],"network":[36],"defenses":[37],"evading":[39],"detection.":[40],"The":[41],"spread":[42,89],"of":[43,58,75,82,90],"self-propagating":[45],"malware":[46,92],"is":[51],"strongly":[52],"impacted":[53],"by":[54],"the":[55,71,80,88],"spatio-temporal":[56],"properties":[57],"networked":[59],"devices.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64],"use":[65],"hierarchical":[67],"model":[68],"represent":[70],"coordinated,":[72],"structured":[73],"movement":[74],"military":[76],"units,":[77],"evaluate":[79],"effectiveness":[81],"several":[83],"defensive":[84],"strategies":[85],"slowing":[87],"Bluetooth-based":[91],"using":[93],"agent-based":[94],"simulation.":[95]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
