Bluetooth Just Works: Security and Vulnerability.
Mohamed Yanis SadaouiSirine HamzaOsman SalemAhmed MehaouaPublished in: ISNCC (2023)
Keyphrases
- security vulnerabilities
- risk assessment
- information security
- buffer overflow
- mobile phone
- security systems
- security requirements
- intrusion detection
- ubiquitous computing
- security issues
- penetration testing
- information assurance
- security risks
- data security
- security analysis
- access control
- network security
- key management
- neural network
- security threats
- security level
- security policies
- functional requirements
- network management
- security properties
- cyber security
- cellular phone
- risk management
- security measures
- security protocols
- end to end
- multi hop