Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Bluetooth
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Cryptography
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
Application Layer
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
BLE Security Scan framework
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
biblio
LA-ANA based Architecture for Bluetooth Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Throughput
Mathematical model
wireless sensor networks
composability
telecommunication congestion control
fault tolerance
Fault tolerant systems
multicast communication
bluetooth security
autonomic network
Autonomic Network Architecture (ANA)
Bluetooth based dynamic environment
Bluetooth environment
dynamic environment
LA-ANA based architecture
LACAS
LACAS based wireless sensor network
multicast packet delivery
multiple sensor node technology
Piconet
stochastic model
unicast packet delivery
Wireless Personal Area Network
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
Protocols
Communication system security
Wireless communication
composability
fingerprint identification
Synchronization
Physical layer
Clocks
bluetooth security
software radio
authentication layer
Bluetooth devices fingerprinting
Bluetooth scan
communication protocol
low cost SDR
physical-layer fingerprinting approach
Software Defined Radios
transmitters identification
wireless communication scheme
wireless security
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
address randomization
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
BT spectrum analysis
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
high data rates
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
resilience
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
authorisation
security
Servers
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
data privacy
privacy
health care
composability
mobile computing
Computer crime
sensitive information
Security analysis
Data Security
security vulnerability
mobile devices
Privacy Risk
malicious attack
Biomedical monitoring
bluetooth security
Bluetooth networking
Bluetooth pairing process
dieting formula
eating constraint
fitbit
Google Glass
Hacker
health monitor system
health tracker devices
human health parameter monitoring
Jawbone
mobile health
mobile wearable health devices
privacy breach
privacy features
security risk
sensitive data information
user data security
user sleeping arrangements
Wearable devices
biblio
Design of a Smart Home System Using Bluetooth Protocol
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Protocols
composability
home automation
Switches
microcontrollers
Smart homes
mobile phones
relay
Bars
Home appliances
security systems
bluetooth security
Bluetooth based smart home automation system
Bluetooth protocol
centralized control unit
Diptrace software
fully functional smart home prototype
home processes
main processer
Micro-controller
PCB layout design
Peripheral interface controller microcontroller
peripheral interfaces
printed circuit layout
Sensor
unit system
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
authorisation
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
performance evaluation
authentication
Cryptography
Protocols
standards
composability
ubiquitous computing
mobile radio
attacks
wireless security
bluetooth security
authentication procedure
BIAS attacks
Bluetooth chips
Bluetooth devices
Bluetooth Impersonation AttackS
Bluetooth standard
Bluetooth version
impersonation
mandatory mutual authentication
secure authentication procedure
secure connection establishment
slave impersonation attacks
wireless communication pervasive technology
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
error statistics
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
communicating devices
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
MITM Attack
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
tools
Internet of Things
security
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Software
telecommunication security
Protocols
personal area networks
standards
composability
Ad hoc networks
wireless LAN
human computer interaction
wireless networks
denial of service
Bluetooth devices security
Bluetooth IoT devices
Bluetooth technologies
concept denial
device-to-device communications
forming ad hoc networks
frequency-hoping spread spectrum technique
operation necessitates special hardware
proof-of-concept DoS attack
study Bluetooth device security
study Bluetooth security
bluetooth security
biblio
Design Considerations for Low Power Internet Protocols
Submitted by aekwall on Mon, 12/21/2020 - 12:29pm
IoT
IP networks
Protocols
power aware computing
pubcrawl
composability
energy conservation
internet
6LoWPAN
Energy Efficiency
embedded systems
Bluetooth
interoperability
telecommunication network reliability
personal area networks
IEEE 802.15 Standard
telecommunication network planning
Resiliency
code size
design considerations
IPv6 connectivity
low power Internet protocols
low-power wireless networks
small maximum transfer unit
1
2
3
4
5
6
next ›
last »