1. Brenner, B.: Mobile Carriers Admit to Malware Attacks (2007),
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1243513,00.html
2. Scarfone, K., Padgette, J.: Guide to Bluetooth Security, NIST Special Publication 800-121, National Institute of Standards and Technology (2008)
3. Loo, A.: Security Threats of Smart Phones and Bluetooth. Communications of ACM 52(3), 150–152 (2009)
4. Herfurt, M.: Bluesnarfing @ CeBIT 2004 - Detecting and attacking Bluetooth-enabled cell phones at the Hannover Fairground, pp. 1–12 (2004),
http://trifinite.org/Downloads/BlueSnarf_CeBIT2004.pdf
5. Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, 2nd edn. Springer, Heidelberg (2003)