Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems
暂无分享,去创建一个
[1] Dirk Timmermann,et al. Secure privacy preserving information beacons for public transportation systems , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[2] Erol Gelenbe,et al. Distributed Building Evacuation Simulator for Smart Emergency Management , 2010, Comput. J..
[3] Scott F. Midkiff,et al. An analysis of Bluetooth security vulnerabilities , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[4] Shivakumar S. Bagi,et al. A system and method for transmission of traffic sign board information to vehicles and relevance determination , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.
[5] Stelios Timotheou,et al. Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios , 2009, SAC '09.
[6] George Loukas,et al. Bluetooth Low Energy Based Occupancy Detection for Emergency Management , 2016, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS).
[7] Pekka Toivanen,et al. Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures , 2013 .
[8] Wei Zhou,et al. A proposal of interaction system between visitor and collection in museum hall by iBeacon , 2015, 2015 10th International Conference on Computer Science & Education (ICCSE).
[9] George Loukas,et al. Occupancy Detection for Building Emergency Management Using BLE Beacons , 2016, ISCIS.
[10] Dae-Jea Cho,et al. Design and Implementation of Automatic Attendance Check System Using BLE Beacon , 2015, MUE 2015.
[11] Choon-Sung Nam,et al. BLE-OTP Authorization Mechanism for iBeacon Network Security , 2015 .
[12] Il-Woo Lee,et al. Smart office energy management system using bluetooth low energy based beacons and a mobile app , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).
[13] Joseph Kee-Yin Ng,et al. Activity tracking and monitoring of patients with alzheimer’s disease , 2015, Multimedia Tools and Applications.
[14] Konstantin Hyppönen,et al. Bluetooth Security Attacks , 2013, SpringerBriefs in Computer Science.
[15] Sungil Kim,et al. Indoor positioning system techniques and security , 2015, 2015 Forth International Conference on e-Technologies and Networks for Development (ICeND).
[16] Erol Gelenbe,et al. Spatial Computers for Emergency Support , 2013, Comput. J..
[17] Prasant Misra,et al. Security Challenges in Indoor Location Sensing using Bluetooth LE Broadcast , 2015 .