Login / Signup
Cut It: Deauthentication Attack on Bluetooth.
Karim Lounis
Published in:
SIN (2021)
Keyphrases
</>
mobile phone
short range
countermeasures
wifi
real time
database
ubiquitous computing
long range
multi hop
mobile terminals
dos attacks
malicious attacks
detection mechanism
cellular phone
ddos attacks
secret key
mobile ad hoc networks
wireless communication