Cited By
View all- Kavisankar LVemuri AVenkatesan SKhondoker R(2024)A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)10.1109/IOTSMS62296.2024.10710276(50-57)Online publication date: 2-Sep-2024
- Brown BVigren MRostami AGlöss M(2022)Why Users Hack: Conflicting Interests and the Political Economy of SoftwareProceedings of the ACM on Human-Computer Interaction10.1145/35557746:CSCW2(1-26)Online publication date: 11-Nov-2022
- Lonzetta ACope PCampbell JMohd BHayajneh T(2018)Security Vulnerabilities in Bluetooth Technology as Used in IoTJournal of Sensor and Actuator Networks10.3390/jsan70300287:3(28)Online publication date: 19-Jul-2018
- Show More Cited By