BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS

Abstract

Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.

Authors and Affiliations

Konstiantyn Tykhonov

Keywords

Related Articles

THE CONCEPT OF EXECUTIVE POWER

The article analyzes the works of Ukrainian and Russian scholars. Different views and approaches to the definition of the concept of executive power are investigated. Also, in the article we have researched the place of...

FUZZY METHODS IN COGNITIVE MODELING

Alternative approaches to qualitative analysis in technological prediction and subsequent cognitive modeling of research object were suggested in the article; cognitive map structural stabilization procedure was improved...

PREDICTION RESPIRATORY VIRAL DISEASES USING HIDDEN MARKOV CHAINS

The method of predicting respiratory viral diseases using Hidden Markov chains.

MODIFIED METHOD OF VOLUMES DATA COMPRESSION

The research lossless compression algorithms and proposed a modified method of volume data compression based on the results obtained.

ПОСРЕДНИЧЕСТВО В РЕГУЛИРОВАНИИ МЕЖДУНАРОДНЫХ ТОРГОВЫХ ОТНОШЕНИЙ

Республика социально ориентированной рыночной экономики, построение демократического государства и гражданского общества, международные торговые отношения являются очень важным посредником. Посредническая деятельность на...

Download PDF file
  • EP ID EP610336
  • DOI -
  • Views 62
  • Downloads 0

How To Cite

Konstiantyn Tykhonov (2018). BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS. Международный научный журнал "Интернаука", 1(13), 36-38. https://europub.co.uk/articles/-A-610336