Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficiently urgent, because the creation of the classifica...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2012-09-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/450 |