BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS
Journal Title: Международный научный журнал "Интернаука" - Year 2018, Vol 1, Issue 13
Abstract
Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.
Authors and Affiliations
Konstiantyn Tykhonov
CRYOSKOPIC TEMPERATURE OF REDUCED FATTY CREAM
The article presents the results of determination of the cryoscopic temperature of cream with low fat content. The influence of sodium alginate and j-carrageenan on the nature of freezing of water in the system is shown....
COMPARING TYPESCRIPT AND JAVASCRIPT PROGRAMMING LANGUAGES IN MODERN WEB APPLICATIONS DEVELOPMENT
Were compared TypeScript and JavaScript programming languages, were shown, that TypeScript usage simplifies web-application development and testing.
TRANSPORT TRAFFIC AT CROSSROADS MODELING FOR REGULATION PROCESS OPRIMISATION
This paper concerns methods of control transport traffic at crossroads modeling for regulation process optimization by Dijkstra’s algorithm and Ford-Fulkerson.
A MECHANISM OF MANAGEMENT AND PROVIDING OF FINANCIAL FIRMNESS IS ON ENTERPRISE
Essence and necessity of management and providing of financial stability is certain on an enterprise. The analysis of level of financial stability of enterprises is carried out in Ukraine. The mechanism of management fin...
FEATURES A SELECTION CRITERION OF OPTIMAL CONTROL
The main problem is the difficulty of selecting the optimal index for the assessment of business operations. The paper considers the possibility of bringing the registration model system operations. Mathematical processi...