Login / Signup
An analysis of Bluetooth security vulnerabilities.
Creighton T. R. Hager
Scott F. Midkiff
Published in:
WCNC (2003)
Keyphrases
</>
data analysis
mobile phone
security vulnerabilities
real world
knowledge discovery
data processing
low cost