Login / Signup
Any Bluetooth device can be hacked. Know how?
Prathibha Muraleedhara
Mary Subaja Christo
Jaya J
Yuvasini D
Published in:
Cyber Secur. Appl. (2024)
Keyphrases
</>
mobile terminals
cellular phone
mobile phone
short range
ubiquitous computing
real time
computer vision
data sets
multiscale
data structure
low cost
end to end
wifi
multi hop