Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Covid-19: Secure healthcare internet of things networks, current trends and challenges with future research directions
The number of affirmed COVID-19 cases showed an enormous increase in the recent past
throughout the globe. Kee** in view the catastrophic destruction of this devastating virus …
throughout the globe. Kee** in view the catastrophic destruction of this devastating virus …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
Evaluating physical-layer ble location tracking attacks on mobile devices
Mobile devices increasingly function as wireless tracking beacons. Using the Bluetooth Low
Energy (BLE) protocol, mobile devices such as smartphones and smartwatches …
Energy (BLE) protocol, mobile devices such as smartphones and smartwatches …
Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
{BLESA}: Spoofing attacks against reconnections in bluetooth low energy
The Bluetooth Low Energy (BLE) protocol ubiquitously enables energy-efficient wireless
communication among resource-constrained devices. To ease its adoption, BLE requires …
communication among resource-constrained devices. To ease its adoption, BLE requires …
A survey on indoor positioning security and privacy
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …
marketing, mobile navigation, etc., there has been considerable interest in indoor …
{LIGHTBLUE}: Automatic {Profile-Aware} debloating of bluetooth stacks
The Bluetooth standard is ubiquitously supported by computers, smartphones, and IoT
devices. Due to its complexity, implementations require large codebases, which are prone to …
devices. Due to its complexity, implementations require large codebases, which are prone to …
Practical obfuscation of BLE physical-layer fingerprints on mobile devices
H Givehchian, N Bhaskar, A Redding… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Mobile devices continuously beacon Bluetooth Low Energy (BLE) advertisement packets.
This has created the threat of attackers identifying and tracking a device by sniffing its BLE …
This has created the threat of attackers identifying and tracking a device by sniffing its BLE …
Blueswat: A lightweight state-aware security framework for bluetooth low energy
Bluetooth Low Energy (BLE) is a short-range wireless communication technology for
resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based …
resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based …