Cited By
View all- Blancaflor EBillo HDignadice JDomondon PLinco MValero C(2025)Bluetooth Simulated Reconnaissance Attack Through the Use of HCITool: A Case Study2nd International Conference on Cloud Computing and Computer Networks10.1007/978-3-031-78131-5_10(133-143)Online publication date: 3-Jan-2025
- Wu JWu RXu DTian DBianchi A(2024)SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00023(2847-228066)Online publication date: 19-May-2024
- Lange SGringoli FHollick MClassen J(2024)Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming AgreementsComputer Security – ESORICS 202410.1007/978-3-031-70903-6_11(208-228)Online publication date: 16-Sep-2024
- Show More Cited By