Communications of the ACM
The Mathematics of Infectious Diseases
SIAM Review
Bluetooth Implementation and Use
Bluetooth Implementation and Use
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
An ns-based Bluetooth Topology Construction Simulation Environment
ANSS '03 Proceedings of the 36th annual symposium on Simulation
Bluetooth Security
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A community based mobility model for ad hoc network research
REALMAN '06 Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality
A review of WPAN security: attacks and prevention
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
BlueBat: towards practical bluetooth honeypots
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Why mobile-to-mobile wireless malware won't cause a storm
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Sherlock Holmes and the case of the advanced persistent threat
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Low cost crowd counting using audio tones
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.00 |
Current Bluetooth worms pose relatively little danger compared to Internet scanning worms but things might change soon. Theauthors' BlueBag project shows targeted attacks through Bluetooth malware using proof-of-concept codes and devices that demonstrate theirfeasibility.