BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS
Journal Title: Международный научный журнал "Интернаука" - Year 2018, Vol 1, Issue 13
Abstract
Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.
Authors and Affiliations
Konstiantyn Tykhonov
CLASSIFICATION OF PATIENTS WITH CORONARY HEART DISEASE WITH DIABETES AT DIAGNOSIS OF POSTOPERATIVE COMPLICATIONS
The risk factors for the development of arrhythmias in patients with ischemic heart disease with simultaneous diabetes in the early postoperative period were found by the method of the tree classifications, for the addic...
THE PRINCIPLES OF HIGH LOAD WEB-SYSTEMS DEVELOPMENT
The overview of problem in high load web-systems development is fulfilled and appropriate architectural solutions are offered.
INFLUENCE OF GAS PIPELINE LOADING ON CHOICE OF OPTIMIZATION CRITERIA
The significant work of the gas transportation system is significantly affected by the significant wear of the gas transmission equipment used. Positive results can be achieved primarily by optimizing the operation of th...
CALCULATED PARAMETERS OF WIND POWER ENGINEERING UNITS WHICH WORK AT MILLED WIND SPEEDS
The optimization procedure of wind turbinesdesign parameters aimed at adaptation them of meteorological condition of Ukraine is considered. If is shown that increasing of energy output be obtained by the proper selection...
DEVELOPMENT OF METHODS OF MANAGEMENT IN AN ENTERPRISE JAVA APPLICATION
The purpose of writing this article was to compare several methods of development and access management in an enterprise Java application. There was a problem with the use of a particular method depending on the needs of...