Vulnerability Analysis of Bluetooth Technology for Defensive Application

Author(s):  
Swapnil Sutar ◽  
Kishore Malladi ◽  
Priyanka Mekala ◽  
Supriya Goel
IET Software ◽  
2020 ◽  
Vol 14 (6) ◽  
pp. 654-664
Author(s):  
Abubakar Omari Abdallah Semasaba ◽  
Wei Zheng ◽  
Xiaoxue Wu ◽  
Samuel Akwasi Agyemang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 168885-168898
Author(s):  
Jingjing Gu ◽  
Weining Zheng ◽  
Yi Zhuang ◽  
Qianwen Zhang

2021 ◽  
Vol 1763 (1) ◽  
pp. 012015
Author(s):  
M Rusydi ◽  
M B Cyio ◽  
Rahmawati ◽  
Ramlan

Sign in / Sign up

Export Citation Format

Share Document