Taming the Blue Beast: A Survey of Bluetooth Based Threats.
John Paul DunningPublished in: IEEE Secur. Priv. (2010)
Keyphrases
- mobile phone
- ubiquitous computing
- countermeasures
- short range
- wifi
- active database management systems
- information security
- computer security
- cellular phone
- mobile terminals
- security issues
- radio frequency
- cyber attacks
- security services
- malicious attacks
- database
- long range
- event detection
- security threats
- neural network
- denial of service attacks
- security measures
- real time