{"id":"https://openalex.org/W2910452099","doi":"https://doi.org/10.1109/aiccsa.2018.8612809","title":"Bluetooth Intrusion Detection System (BIDS)","display_name":"Bluetooth Intrusion Detection System (BIDS)","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2910452099","doi":"https://doi.org/10.1109/aiccsa.2018.8612809","mag":"2910452099"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2018.8612809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028622409","display_name":"Pratik Satam","orcid":"https://orcid.org/0000-0003-3139-8333"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"funder","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pratik Satam","raw_affiliation_strings":["Electrical and Computer Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108737732","display_name":"Shalaka Satam","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"funder","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shalaka Satam","raw_affiliation_strings":["Electrical and Computer Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057335897","display_name":"Salim Hariri","orcid":"https://orcid.org/0000-0003-3956-3401"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"funder","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Salim Hariri","raw_affiliation_strings":["Electrical and Computer Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.65,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":15,"citation_normalized_percentile":{"value":0.761405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9899,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scatternet","display_name":"Scatternet","score":0.5009651}],"concepts":[{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.9381403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78725314},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.55624634},{"id":"https://openalex.org/C252157","wikidata":"https://www.wikidata.org/wiki/Q348822","display_name":"Scatternet","level":4,"score":0.5009651},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48643327},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42729405},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3732978},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13408136}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2018.8612809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1497336187","https://openalex.org/W1500034700","https://openalex.org/W1548212946","https://openalex.org/W1567276288","https://openalex.org/W1597533204","https://openalex.org/W1670263352","https://openalex.org/W1894069597","https://openalex.org/W1988790447","https://openalex.org/W2003137300","https://openalex.org/W2008056655","https://openalex.org/W2020083638","https://openalex.org/W2031161583","https://openalex.org/W2069273735","https://openalex.org/W2109682028","https://openalex.org/W2112076978","https://openalex.org/W2143177983","https://openalex.org/W2169768310","https://openalex.org/W2467579251","https://openalex.org/W2591906241","https://openalex.org/W2626431566","https://openalex.org/W2763795488","https://openalex.org/W2770462842"],"related_works":["https://openalex.org/W2574725690","https://openalex.org/W2375797699","https://openalex.org/W2212306967","https://openalex.org/W2143206749","https://openalex.org/W2120363488","https://openalex.org/W2114062931","https://openalex.org/W2042045193","https://openalex.org/W2014770477","https://openalex.org/W1972835748","https://openalex.org/W1551681429"],"abstract_inverted_index":{"With":[0],"the":[1,16,111,150,154,166,191,195],"rapid":[2],"deployment":[3],"of":[4,19,84,108,125,153],"IOT":[5],"devices,":[6],"Bluetooth":[7,26,35,66,89,112,136,138,155,174,196],"networks,":[8],"which":[9],"form":[10],"Personal":[11],"Area":[12],"Networks(PAN),":[13],"have":[14],"become":[15,100],"wireless":[17,70],"network":[18],"choice":[20],"for":[21,135,171,194],"small":[22],"range/indoor":[23],"communications":[24],"networks.":[25],"is":[27,90],"widely":[28],"used":[29,91,163,170,188],"to":[30,44,50,102,114,148,164,189,207,212],"deliver":[31],"audio":[32],"streams":[33],"(e.g.:":[34,48],"headphones,":[36],"Music":[37],"systems":[38],"in":[39,93],"cars),":[40],"connecting":[41,52],"peripherals":[42],"devices":[43,47,113],"more":[45],"powerful":[46],"keyboards":[49],"computers),":[51],"wearable":[53],"technology":[54],"like":[55,159,179],"smart":[56],"watches,":[57],"heart":[58],"monitors":[59],"and":[60,97,209],"fitness":[61],"trackers.":[62],"It's":[63],"imperative":[64],"that":[65],"networks":[67],"(like":[68],"other":[69],"networks)":[71],"are":[72],"secure":[73,116],"against":[74,117],"cyberattacks":[75],"such":[76],"as":[77],"Man":[78],"In":[79],"The":[80,141,198],"Middle":[81],"Attacks(MITM),":[82],"Denial":[83],"Service":[85],"attacks(DoS),":[86],"etc.":[87],"Moreover,":[88],"heavily":[92],"mobile":[94],"devices/":[95],"sensors,":[96],"consequently":[98],"they":[99],"sensitive":[101],"battery":[103,119],"utilization":[104],"attacks;":[105],"this":[106,126],"type":[107],"attacks":[109],"requires":[110],"be":[115],"different":[118],"draining":[120],"attacks.":[121],"As":[122],"a":[123],"part":[124],"paper":[127],"we":[128],"present":[129],"an":[130,144],"anomaly-based":[131],"intrusion":[132],"detection":[133],"system":[134],"networks;":[137],"IDS":[139],"(BIDS).":[140],"BIDS":[142],"use":[143],"n-gram":[145],"based":[146],"approach":[147],"characterize":[149],"normal":[151],"behavior":[152,192],"protocol.":[156,197],"Smoothing":[157],"techniques":[158],"Jelinek-Mercer":[160],"smoothing":[161],"was":[162],"improve":[165],"machine":[167],"learning":[168,177],"algorithm":[169],"detecting":[172],"abnormal":[173],"operations.":[175],"Machine":[176],"algorithms":[178],"C4.5,":[180],"AdaBoostMl,":[181],"SVM,":[182],"Na\u00efve":[183],"Bayes,":[184],"RIPPER,":[185],"Bagging":[186],"were":[187],"build":[190],"models":[193,200],"developed":[199],"had":[201],"high":[202],"accuracy":[203],"with":[204],"precision":[205],"up":[206,211],"99.6%":[208],"recall":[210],"99.6%.":[213]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2910452099","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1}],"updated_date":"2025-04-19T04:34:28.596946","created_date":"2019-01-25"}