Author:
Su Jing,Chan Kelvin K. W.,Miklas Andrew G.,Po Kenneth,Akhavan Ali,Saroiu Stefan,de Lara Eyal,Goel Ashvin
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy;Information;2023-09-27
2. SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures;Communications in Computer and Information Science;2022
3. Identifying Key Cyber-Physical Terrain;Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics;2017-03-24
4. Influence of node mobility on virus spreading behaviors in multi-hop network;EURASIP Journal on Wireless Communications and Networking;2016-07-22
5. Worm propagation model in mobile network;Concurrency and Computation: Practice and Experience;2015-06-05