Author:
Azhar M. A. Hannan Bin,Abadia German
Publisher
Springer International Publishing
Reference26 articles.
1. Kamkar, S.: Drive It Like You Hacked It (DEF CON 23) (2015). https://samy.pl/defcon2015/. Accessed 10 June 2021
2. Keyless Entry System Attacks (2017). https://conference.hitb.org/hitbsecconf2017ams/sessions/chasing-cars-keyless-entry-system-attacks/. Accessed 10 June 2021
3. Ballantyne, S.N.T.: Wireless Communication Security: Software Defined Radio-Based Threat Assessment, MSC by Research Thesis, Coventry University (2016)
4. Achi, H., Hellany, A., Nagrial, M.: Digital forensics of wireless systems and devices technical and legal challenges. In: 6th International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 43–46 (2009). https://doi.org/10.1109/HONET.2009.5423057
5. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;B Turnbull,2009