Taming the Blue Beast: A Survey of Bluetooth-Based Threats
John Paul Dunning
IEEE Security & Privacy March/April 2010
Target: Mobile device security threats via Bluetooth that could affect gaming (surveillance, malware, unauthorized access)
Aim: Dunning, J. P. (2010). Taming the blue beast: A survey of Bluetooth-based threats. IEEE Security & Privacy, 8(2), 20-27.
Recommendation: (Dunning, 2010)