Login / Signup
Quick detection of NFC vulnerability: Implementation weakness exploitation.
Firman Azhari
Published in:
Inf. Manag. Comput. Secur. (2014)
Keyphrases
</>
object detection
automatic detection
detection method
mobile devices
false positives
detection accuracy
detection scheme
real time
databases
efficient implementation
false alarms
communication technologies
target detection
implementation issues