Zobrazeno 1 - 3
of 3
pro vyhledávání: '"A. A. Pikhtulov"'
Analysis and Classification of Attacks on Mobile Devices Using the Bluetooth ProtocolVulnerabilities
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 36-43 (2012)
Bluetooth technology is very vulnerable, and there are many ways to use it for malicious activity on your mobile device. The review of the different attacks and the creation of their classification are given in this article. This problem is sufficien
Externí odkaz:
https://doaj.org/article/d0136fabae9246bc80e8b4c3aca2b866
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 47-49 (2012)
The article is dedicated to the attacks on Bluetooth devices. The described attacks allow a hacker to get information about the device. The attack could be implemented both when the Bluetooth receiver works in the hidden mode and when the receiver is
Externí odkaz:
https://doaj.org/article/937c02073a6d4cf1acb0170ebe287a3d
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2S, Pp 44-46 (2012)
The article is dedicated to the attacks on Bluetooth devices. Two described attacks can have devices to be switched off as the key result. Moreover one of the attacks could be done without the device’s user knowing about it. The second one could be
Externí odkaz:
https://doaj.org/article/b5eff3224f074aba9b85c69369bdb533