1. Ramokapane, K.M., Mazeli, A.C., Rashid, A.: Skip, skip, skip, accept!!!: A study on the usability of smartphone manufacturer provided default features and user privacy. Proc. Priv. Enhanc. Technol. 2019(2), 209–227 (2019). https://doi.org/10.2478/popets-2019-0027
2. Apple: How to use AirDrop on your iPhone or iPad. Apple Support, 26 September 2023. https://support.apple.com/en-gb/HT204144
3. Al Neyadi, E., Al Shehhi, S., Al Shehhi, A., Al Hashimi, N., Qbea’H, M., Alrabaee, S.: Discovering public Wi-Fi vulnerabilities using raspberry pi and Kali Linux. In: 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC), pp. 1–4 (2020).https://doi.org/10.1109/URC49805.2020.9099187
4. Stouffer, C.: Bluetooth security risks to know (and how to avoid them). Norton, 2 October 2022. https://us.norton.com/blog/mobile/bluetooth-security
5. Stute, M., et al.: A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link (2019). https://www.usenix.org/conference/usenixsecurity19/presentation/stute