BLUETOOTH SECURITY THREATS
暂无分享,去创建一个
[1] B. B. Gupta,et al. Defending against Distributed Denial of Service Attacks: Issues and Challenges , 2009, Inf. Secur. J. A Glob. Perspect..
[2] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[3] Driss El Ouadghiri,et al. Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods , 2011, MoMM '11.
[4] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[5] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[6] K. Haataja,et al. Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] John Paul Dunning,et al. Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.
[8] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[9] Frank Stajano. Repairing the Bluetooth Pairing Protocol , 2005, Security Protocols Workshop.
[10] Chen Eric Yi-Hua,et al. Defending against distributed denial of service attacks , 2005 .