Login / Signup
Analyzing the Security of Bluetooth Low Energy.
Seth Sevier
Ali Tekeoglu
Published in:
ICEIC (2019)
Keyphrases
</>
low energy
electron microscopy
minimum energy
access control
protein folding
mobile phone
intrusion detection
neural network
ubiquitous computing
x ray
multi hop
data sets
low cost
activity recognition
coarse grained