|
Volumn , Issue , 2006, Pages 245-256
|
Bluetooth worms: Models, dynamics, and defense implications
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BLUETOOTH PROTOCOL;
CAPACITY CONSTRAINTS;
COMMWARRIOR;
BLUETOOTH;
COMPUTER SIMULATION;
MOBILE DEVICES;
PERSONAL DIGITAL ASSISTANTS;
SECURITY OF DATA;
COMPUTER VIRUSES;
|
EID: 39049104692
PISSN: 10639527
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ACSAC.2006.18 Document Type: Conference Paper |
Times cited : (39)
|
References (19)
|