Sign in

Security Vulnerabilities in Bluetooth Technology as Used in IoT.

Angela M. LonzettaPeter CopeJoseph CampbellBassam Jamil MohdThaier Hayajneh
Published in: J. Sens. Actuator Networks (2018)
Keyphrases
  • security vulnerabilities
  • ubiquitous computing
  • management system
  • mobile phone
  • data mining
  • computer systems
  • cost effective
  • sensor networks
  • data processing
  • lightweight
  • end to end
  • penetration testing