{"entities":{"Q4763":{"pageid":27882,"ns":120,"title":"Item:Q4763","lastrevid":88375,"modified":"2020-06-16T17:59:46Z","type":"item","id":"Q4763","labels":{"en":{"language":"en","value":"BIAS: Bluetooth Impersonation AttackS"}},"descriptions":{"en":{"language":"en","value":"scholarly article published in May 2020"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":210,"id":"Q210"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4763$912749CB-B72D-4F4E-854B-B5160929C8B4","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://francozappa.github.io/about-bias/publication/antonioli-20-bias/antonioli-20-bias.pdf","type":"string"},"datatype":"url"},"type":"statement","id":"Q4763$0d1acd01-41e9-b026-eaf1-c68f677791f8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://github.com/francozappa/bias","type":"string"},"datatype":"url"},"type":"statement","qualifiers":{"P126":[{"snaktype":"value","property":"P126","hash":"3f884b60b3e80590a917b9a64a189b0824d4294d","datavalue":{"value":"tool kit","type":"string"},"datatype":"string"}]},"qualifiers-order":["P126"],"id":"Q4763$f314930f-4e8e-6c69-fbf4-e709d88f052f","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2020-05-21T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4763$a1605f4d-4cce-0087-07b8-12362aae4618","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4406,"id":"Q4406"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4763$f8ded6df-4d56-b2c5-2ae4-0702557aa3e2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4138,"id":"Q4138"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4763$510f9a75-429f-e800-9a84-18105d06bb8f","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"For each of the 28 Blue-tooth chips tested, the table shows if the chip is vulnerable or not. Furthermore, all devices in the market using any of the vulnerable chips in this Table  should be vulnerable to our BIAS attacks.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4763$01fd5fe3-437f-8a1c-55dd-9b9a85d040bc","rank":"normal"}]},"sitelinks":{}}}}