Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Bluetooth Special Interest Group (SIG), “Bluetooth Core Specification Version 5.0,” Bluetooth Core Specif. Version 4.2, 2016, doi: 10.4049/jimmunol.1302359.
    2. J. Decuir, “Introducing bluetooth smart: Part 1: A look at both classic and new technologies,” IEEE Consumer Electronics Magazine. 2014, doi: 10.1109/MCE.2013.2284932
    3. R. Mitchell and I. R. Chen, “A survey of intrusion detection in wireless network applications,” Computer Communications. 2014, doi: 10.1016/j.comcom.2014.01.012.
    4. I. Howitt and G. Jore A., “IEEE 802.15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs),” Wirel. Commun. Netw., 2011, doi: 10.1109/IEEESTD.2011.6012487.
    5. M. Verma, S. Singh, and B. Kaur, “An Overview of Bluetooth Technology and its Communication Applications,” Int. J. Curr. Eng. Technol. E Int. J. Curr. Eng. Technol., 2015.
    6. W. Ren and Z. Miao, “A hybrid encryption algorithm based on DES and RSA in Bluetooth communication,” 2010, doi: 10.1109/WMSVM.2010.48.
    7. M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wirel. Commun., 2012, doi: 10.1109/TWC.2012.102612.111278.
    8. M. Denis, C. Zena, and T. Hayajneh, “Penetration testing: Concepts, attack methods, and defense strategies,” 2016, doi: 10.1109/LISAT.2016.7494156.
    9. M. Ghallali, D. El Ouadghiri, M. Essaaidi, and M. Boulmalf, “Mobile phones security: The spread of malware via MMS and Bluetooth, prevention methods,” 2011, doi: 10.1145/2095697.2095750.
    10. M. La Polla, F. Martinelli, and D. Sgandurra, “A survey on security for mobile devices,” IEEE Commun. Surv. Tutorials, 2013, doi: 10.1109/SURV.2012.013012.00028
    11. D. Mani and A. Mahendran, “DDOS detection and mitigation for managed security of cloud resources,” Int. J. Pharm. Technol., 2016.

    1. Bluetooth Special Interest Group (SIG), ‘Bluetooth Core Specification Version 5.0’, 2016.
    2. J. Decuir, ‘Introducing bluetooth smart: Part 1: A look at both classic and new technologies’, IEEE Consumer Electronics Magazine. 2014.
    3. R. Mitchell and I. R. Chen, ‘A survey of intrusion detection in wireless network applications’, Computer Communications. 2014.
    4. I. Howitt and G. Jore A., ‘IEEE 802.15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)’, Wirel. Commun. Netw., 2011.
    5. M. Verma, S. Singh, and B. Kaur, ‘An Overview of Bluetooth Technology and its Communication Applications’, Int. J. Curr. Eng. Technol. E Int. J. Curr. Eng. Technol., 2015.
    6. W. Ren and Z. Miao, ‘A hybrid encryption algorithm based on DES and RSA in Bluetooth communication’, in Proceedings - 2010 2nd International Conference on Modeling, Simulation, and Visualization Methods, WMSVM 2010, 2010.
    7. M. Duarte, C. Dick, and A. Sabharwal, ‘Experiment-driven characterization of fullduplex wireless systems’, IEEE Trans. Wirel. Commun., 2012.
    8. M. Denis, C. Zena, and T. Hayajneh, ‘Penetration testing: Concepts, attack methods, and defense strategies’, in 2016 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2016, 2016.
    9. M. A. Albahar, O. Olawumi, K. Haataja, and P. Toivanen, ‘Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption’, J. Inf. Secur., vol. 09, no. 02, pp. 168–176, 2018.
    10. M. Ghallali, D. El Ouadghiri, M. Essaaidi, and M. Boulmalf, ‘Mobile phones security: The spread of malware via MMS and Bluetooth, prevention methods’, in ACM International Conference Proceeding Series, 2011.
    11. M. La Polla, F. Martinelli, and D. Sgandurra, ‘A survey on security for mobile devices’, IEEE Commun. Surv. Tutorials, 2013
    12. D. Mani and A. Mahendran, ‘DDOS detection and mitigation for managed security of cloud resources’, Int. J. Pharm. Technol., 2016.
    13. Nisha Pandey, B. S. Chowdhary , Bhagwan Das , D. M. Akbar Husain , Vishal Jain , Tanesh Kumar, “Design of Data Processing Device on Low Power SPARTAN6 FPGA”, International Journal of Control and Automation (IJCA).
    14. Sujeet Pandey, Puneet Tomar, Lubna Luxmi Dhirani, D. M. Akbar Hussain, Vishal Jain, Nisha Pandey, “Design of Energy Efficient Sinusoidal PWM Waveform Generator on FPGA”, International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP), Vol. 10 No. 10, October, 2017, page no. 49-58 having ISSN No. 2005- 4254.
    15. B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,”A n Object Oriented approach to Model the secure Health care Database systems,”In proceedings of International conference on computer , communication & signal processing(IC3 SP)in association with IETE students forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3, 2011

Recent Article