[1]
Dr. M.Latha and Dr.S.Arockiasamy, “ANALYSIS OF MALICIOUS DETECTION IN BLUETOOTH ENABLED DEVICES EXPLOITING WIRELESS PERSONAL AREA NETWORKS”, GJCST, vol. 10, no. 1, p. -, Jul. 2010.