|
Volumn 8, Issue 2, 2010, Pages 20-27
|
Taming the blue beast: A survey of bluetooth based threats
|
Author keywords
Bluetooth; Hacking; Mobile computing; Security taxonomy; Wireless communications
|
Indexed keywords
BLUETOOTH-ENABLED DEVICES;
HACKING;
SAMSUNG;
SECURITY TAXONOMY;
SMART PHONES;
THREAT MITIGATION;
TOYOTA PRIUS;
WIRELESS COMMUNICATIONS;
COMPUTER CRIME;
MOBILE COMPUTING;
PERSONAL COMPUTING;
TAXONOMIES;
WIRELESS TELECOMMUNICATION SYSTEMS;
BLUETOOTH;
|
EID: 77950684579
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2010.3 Document Type: Article |
Times cited : (44)
|
References (13)
|