1.
Dr. M.Latha, Dr.S.Arockiasamy. ANALYSIS OF MALICIOUS DETECTION IN BLUETOOTH ENABLED DEVICES EXPLOITING WIRELESS PERSONAL AREA NETWORKS. GJCST [Internet]. 2010 Jul. 15 [cited 2024 Dec. 2];10(1):-. Available from: https://computerresearch.org/index.php/computer/article/view/913