Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Mohammed ZubairDevrim UnalAbdulla K. Al-AliAbdullatif ShikfaPublished in: ICFNDS (2019)
Keyphrases
- mobile terminals
- mobile phone
- ubiquitous computing
- mobile devices
- management system
- smart objects
- smart phones
- information security
- mobile applications
- personal computer
- cloud computing
- location information
- mobile computing
- short range
- information systems
- wireless communication
- countermeasures
- wifi
- access control
- sensor web
- everyday objects