Showing 1 - 5 results of 5 for search 'A. G. Beltov', query time: 0.02s
Refine Results
-
1
Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities by A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy
Published 2012-09-01
Article -
2
Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques by T. R. Khabibullin, A. G. Beltov, I. Y. Zhukov, A. V. Zuykov, A. S. Smirnov
Published 2012-09-01
Article -
3
Attacks on Mobile Phones that Use the Automatic Configuration Mechanism by A. G. Beltov, I. Y. Zhukov, D. M. Mikhailov, A. V. Starikovskiy, A. M. Tolstaya
Published 2012-09-01
Article -
4
Security Problems of Mobile Technologies by A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy, D. M. Mikhailov, A. V. Starikovskiy
Published 2012-09-01
Article -
5
Unauthorized Data Theft from Bluetooth-Enabled Devices Using OBEX Vulnerabilities by A. G. Beltov, I. Y. Zhukov, A. V. Novitskiy, D. M. Mikhailov, A. V. Starikovskiy
Published 2012-09-01
Article