ANALYSIS OF MALICIOUS DETECTION IN BLUETOOTH ENABLED DEVICES EXPLOITING WIRELESS PERSONAL AREA NETWORKS
Keywords:
Downloads
How to Cite
Dr. M.Latha, & Dr.S.Arockiasamy. (2010). ANALYSIS OF MALICIOUS DETECTION IN BLUETOOTH ENABLED DEVICES EXPLOITING WIRELESS PERSONAL AREA NETWORKS. Global Journal of Computer Science and Technology, 10(1), -. Retrieved from https://computerresearch.org/index.php/computer/article/view/913
Published
2010-07-15
Issue
Section
Articles
License
Copyright (c) 2010 Authors and Global Journals Private Limited

This work is licensed under a Creative Commons Attribution 4.0 International License.