Cited By
View all- Blancaflor EMagleo JGarcia JMaligmat RLebosada J(2025)An In-Depth Penetration Testing Study in Evaluating Bluetooth Vulnerabilities and Related Attacks in Smartphones2nd International Conference on Cloud Computing and Computer Networks10.1007/978-3-031-78131-5_8(103-112)Online publication date: 3-Jan-2025
- Gupta CVarshney G(2023)An improved authentication scheme for BLE devices with no I/O capabilitiesComputer Communications10.1016/j.comcom.2023.01.001200:C(42-53)Online publication date: 15-Feb-2023
- Sanjaya MElAarag H(2022)A Novel Application for Automating Security Risk Assessment and Mitigation of Bluetooth Infotainment DevicesJournal of Computing Sciences in Colleges10.5555/3581625.358162638:5(10-20)Online publication date: 1-Nov-2022
- Show More Cited By