Login / Signup
Security Vulnerabilities in Bluetooth Technology as Used in IoT.
Angela M. Lonzetta
Peter Cope
Joseph Campbell
Bassam Jamil Mohd
Thaier Hayajneh
Published in:
J. Sens. Actuator Networks (2018)
Keyphrases
</>
security vulnerabilities
ubiquitous computing
management system
mobile phone
data mining
computer systems
cost effective
sensor networks
data processing
lightweight
end to end
penetration testing