[1]
Dr. M.Latha and Dr.S.Arockiasamy 2010. ANALYSIS OF MALICIOUS DETECTION IN BLUETOOTH ENABLED DEVICES EXPLOITING WIRELESS PERSONAL AREA NETWORKS. Global Journal of Computer Science and Technology. 10, 1 (Jul. 2010), -.