BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS
Journal Title: Международный научный журнал "Интернаука" - Year 2018, Vol 1, Issue 13
Abstract
Ubiquitous adaptation of protocols and technologies for implementations of old solutions in new platform make it more unsecured. That leads to constant change and adaptation. Many solutions aren’t revised and insufficiently tested, which is connected to spectrum of systems and devices. It isn’t surprising that one of the main and most popular technology stacks - Bluetooth have serious vulnerabilities.
Authors and Affiliations
Konstiantyn Tykhonov
THE CONCEPT OF EXECUTIVE POWER
The article analyzes the works of Ukrainian and Russian scholars. Different views and approaches to the definition of the concept of executive power are investigated. Also, in the article we have researched the place of...
FUZZY METHODS IN COGNITIVE MODELING
Alternative approaches to qualitative analysis in technological prediction and subsequent cognitive modeling of research object were suggested in the article; cognitive map structural stabilization procedure was improved...
PREDICTION RESPIRATORY VIRAL DISEASES USING HIDDEN MARKOV CHAINS
The method of predicting respiratory viral diseases using Hidden Markov chains.
MODIFIED METHOD OF VOLUMES DATA COMPRESSION
The research lossless compression algorithms and proposed a modified method of volume data compression based on the results obtained.
ПОСРЕДНИЧЕСТВО В РЕГУЛИРОВАНИИ МЕЖДУНАРОДНЫХ ТОРГОВЫХ ОТНОШЕНИЙ
Республика социально ориентированной рыночной экономики, построение демократического государства и гражданского общества, международные торговые отношения являются очень важным посредником. Посредническая деятельность на...