Login / Signup
Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study.
Kenneth C. K. Wong
Aaron Hunter
Published in:
ICISSP (Revised Selected Papers) (2018)
Keyphrases
</>
low energy
mobile devices
statistical analysis
real time
co occurrence
fine grained