Bluetooth Hacking: A Case Study
<p class="JDFSLParagraph">This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communicati...
Main Authors: | Dennis Browning, Gary C. Kessler |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2009-06-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/164 |
Similar Items
-
Hacking Higher Education: Rethinking the EduHack Course
by: Fabrizio Barpi, et al.
Published: (2021-01-01) -
Hacking Summon
by: Michael Klein
Published: (2010-09-01) -
Hacking Disease
by: Ishaan Kumar
Published: (2020-02-01) -
Hacking for Sustainability
by: Zapico Lamela, Jorge Luis
Published: (2014) -
Media hacking
by: Stanley, Jeffrey Charles
Published: (2011)