(2013). Bluetooth security attacks: Comparative analysis, attacks, and countermeasures.
Citación estilo ChicagoBluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures. 2013.
Cita MLABluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures. 2013.
Precaución: Estas citas no son 100% exactas.