Investigating Bluetooth Vulnerabilities to Defend from Attacks

Research output: Contribution to book or proceedingConference articlepeer-review

5 Scopus citations

Fingerprint

Dive into the research topics of 'Investigating Bluetooth Vulnerabilities to Defend from Attacks'. Together they form a unique fingerprint.
Sort by

Computer Science