amenity 发表于 2025-3-25 05:08:14
https://doi.org/10.1007/978-981-10-8447-8Wireless systems; Cyber Security; Hacking; Software Defined Radio (SDR); Radio Networks; Network Defense豪华 发表于 2025-3-25 08:30:35
Qing Yang,Lin HuangProvides a practical guide, introducing real-world industrial cases in wireless security attacks and defense.Powered by the core researchers from 360 Technology, a successful Chinese Internet securityGLIDE 发表于 2025-3-25 12:01:57
http://reply.papertrans.cn/47/4678/467792/467792_23.png孵卵器 发表于 2025-3-25 18:11:08
Bluetooth Security, build a PAN (Personal Area Network) network. Bluetooth is most commonly used in peripheral devices of cellphones and PCs, such as Bluetooth earphones for cellphones, connection between the cellphone and the car audio, Bluetooth keyboards and mouses. This chapter will cover the security issues related to Bluetooth.Obituary 发表于 2025-3-25 21:19:59
http://reply.papertrans.cn/47/4678/467792/467792_25.pngIRATE 发表于 2025-3-26 02:12:18
Overview of Wireless Security, Attack and Defense,In this chapter the concept of wireless security is introduced in detail, and the common attacks and defense methods are also involved.Formidable 发表于 2025-3-26 06:56:48
Tools for Wireless Security Research,This chapter introduces common tools for wireless security research, including both hardware and software. It covers different software-defined radio hardware platforms, such as USRP, RTL-SDR, HackRF, bladeRF, LimeSDR as well as the most popular software platform GNU Radio.headlong 发表于 2025-3-26 08:46:50
433/315 MHz Communication,433/315 MHz ISM band is widely used in low transmit power devices for short distance communication. The communication protocols are usually simple so some vulnerabilities exist. In this chapter, we will introduce the study methods, give experiment examples.反叛者 发表于 2025-3-26 15:39:30
http://reply.papertrans.cn/47/4678/467792/467792_29.png安心地散步 发表于 2025-3-26 17:30:49
http://reply.papertrans.cn/47/4678/467792/467792_30.png