Login / Signup

Any Bluetooth device can be hacked. Know how?

Prathibha MuraleedharaMary Subaja ChristoJaya JYuvasini D
Published in: Cyber Secur. Appl. (2024)
Keyphrases
  • mobile terminals
  • cellular phone
  • mobile phone
  • short range
  • ubiquitous computing
  • real time
  • computer vision
  • data sets
  • multiscale
  • data structure
  • low cost
  • end to end
  • wifi
  • multi hop