{"entities":{"Q389385":{"pageid":391152,"ns":120,"title":"Item:Q389385","lastrevid":61473555,"modified":"2026-04-10T23:36:20Z","type":"item","id":"Q389385","labels":{"en":{"language":"en","value":"Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6247912"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$735DC6A8-D001-4C3C-8544-12F6FF0FDF73","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"b52c924aabd65bd1c320ac537c3260b281a0150b","datavalue":{"value":{"text":"Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q389385$97A72A69-2B06-47F4-8A96-DCA6BE05D92C","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"499e16c15b15ea0fa962e3878a955e69cecc0bdd","datavalue":{"value":"1311.68065","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q389385$C30462A6-3AC3-4491-AF84-EC6637B05267","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"7d7484a1d8a3feab345ae9914abc6b70c973b5e6","datavalue":{"value":{"entity-type":"item","numeric-id":389382,"id":"Q389382"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$7379E4AA-22E5-4151-BEA1-903D7A6E17B2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"6561d835ca3b0e07d891d0540b1034d8f173d923","datavalue":{"value":{"entity-type":"item","numeric-id":389383,"id":"Q389383"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$F43FED97-0359-4C95-9DAA-FCA58114A257","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"99a693b053446dea707dbe34975c1466d4fc6961","datavalue":{"value":{"entity-type":"item","numeric-id":389384,"id":"Q389384"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$1EDBEF78-74DD-4B07-8CA4-40E34BC4C9ED","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"3340243f57e05f2265c56423c388055a14b114fa","datavalue":{"value":{"entity-type":"item","numeric-id":107189,"id":"Q107189"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$887FE2F6-975D-474D-B463-73EFC61C19A6","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"12a4d6c941a7664d9ad3090b44efe2602424b911","datavalue":{"value":{"time":"+2014-01-20T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q389385$EC56877A-0144-4332-959E-46ACB43179E0","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"46cee5ad36d5098df604636f9978c903d55d96b8","datavalue":{"value":"https://hdl.handle.net/10652/2708","type":"string"},"datatype":"url"},"type":"statement","id":"Q389385$8E1C5534-5730-455A-B36F-C897184CE953","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q389385$5F10560F-794B-4C92-B8CF-AF5FB064FCC5","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"e5bd74b9ade103a7f6047e088cd6130c5693dd1e","datavalue":{"value":"6247912","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q389385$E82D0C4F-EED0-4434-8BF4-D62D61E9542C","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c3ab9a01413af24b2ab2590a2181f4a5f7949e82","datavalue":{"value":"radio fingerprinting","type":"string"},"datatype":"string"},"type":"statement","id":"Q389385$BCB772BA-98D6-441F-B1AC-93F9FE92D7B7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9fdbd180445e603c2720848d490fb283c4efbf58","datavalue":{"value":"impersonation attack","type":"string"},"datatype":"string"},"type":"statement","id":"Q389385$42766548-F73D-4C42-894B-713A22DADDC6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"b7b6da08bda6123994e3699c0d7a3055be9df3bf","datavalue":{"value":"physical layer security","type":"string"},"datatype":"string"},"type":"statement","id":"Q389385$8818D173-16C2-4431-826F-FDBA52E6A090","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9f89bd9b36d1a68d13e22c1d3a9dc4f8d5b2862f","datavalue":{"value":"hardware security","type":"string"},"datatype":"string"},"type":"statement","id":"Q389385$F5A499DE-FA61-4D11-A4DF-81A9942278D0","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q389385$9A8404A3-C387-4F8B-8A40-370FC3D94CD0","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"6553e38ab7fbf447769c8107751956c85ca32880","datavalue":{"value":"W1980668046","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q389385$8C87A917-32E6-43B0-838E-5EB03FD5AD6A","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"d8fb8210bf06aa17246cc1759591d062830024bc","datavalue":{"value":"10.1016/J.JCSS.2013.06.013","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q389385$8083D1A9-578A-4AB6-9E77-77D69AF044A7","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"1b8d0aad610d4d4dd9fd5a1f412e05809d96992c","datavalue":{"value":{"entity-type":"item","numeric-id":4640914,"id":"Q4640914"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"3f3d9842e88c3df57f577d085225b7a8ce98fa03","datavalue":{"value":{"amount":"+0.6851442456245422","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q389385$6C5DC621-681D-4400-B038-A1C08B2398C9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"28ceeaadc519236594b7ee3ac4b0f57331c3bc45","datavalue":{"value":{"entity-type":"item","numeric-id":2902473,"id":"Q2902473"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"e9a92ac1de205d7ee07c37cf0d9170bfd3e10758","datavalue":{"value":{"amount":"+0.6352795362472534","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q389385$3C6B3B8A-E9FC-4909-B99B-B51E0B7A92BB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"c2c657e535d405174d198dc7197337bb8217d6c1","datavalue":{"value":{"entity-type":"item","numeric-id":967073,"id":"Q967073"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"f87be3bc31fde2f7e4fa0f0ecf7946b99211d9b1","datavalue":{"value":{"amount":"+0.6334189772605896","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q389385$FB15CD2E-E5E6-4BB9-B61E-CBF75940DBAE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"f2a0425116b4273fa407585d7a79641b98b13c4f","datavalue":{"value":{"entity-type":"item","numeric-id":3100897,"id":"Q3100897"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"0d6636bfdb0818197b4ca0faa464a76e7aa0323a","datavalue":{"value":{"amount":"+0.6315140128135681","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q389385$ABDCEE1B-D8BF-4164-A2B4-CCA9BA01D6D9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7cd23eb0ec2542b283e12db9ed30c18f9d2b72b6","datavalue":{"value":{"entity-type":"item","numeric-id":5458946,"id":"Q5458946"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"fa5e4ed55f976a228273153bc82958eb803cc6a3","datavalue":{"value":{"amount":"+0.6307051181793213","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q389385$8FD4FAB7-DCCD-41C9-B729-5E038DC5C0D9","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Analysis_of_impersonation_attacks_on_systems_using_RF_fingerprinting_and_low-end_receivers"}}}}}