Login / Signup
An investigation of Bluetooth security vulnerabilities.
Peter Cope
Joseph Campbell
Thaier Hayajneh
Published in:
CCWC (2017)
Keyphrases
</>
security vulnerabilities
intrusion detection
mobile phone
dos attacks
penetration testing
security properties
artificial intelligence
data processing
network security
mobile devices
end users
low cost
web applications
lightweight
data storage