Login / Signup

Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study.

Kenneth C. K. WongAaron Hunter
Published in: ICISSP (Revised Selected Papers) (2018)
Keyphrases
  • low energy
  • mobile devices
  • statistical analysis
  • real time
  • co occurrence
  • fine grained