Maksymilian Augustyn edited section_References_textit_Zigbee_Exploited__.tex  almost 8 years ago

Commit id: 7cff1b95a07f28d81197f0b8343be8cbc8a5255e

deletions | additions      

       

\section{References}  \textit{Zigbee Exploited. The good, the bad and the ugly.}, Tobias Zillner, Cognosec, 2015. Access 26.06.2016   \texit{Bluetooth: With Low Energy comes Low Security.}, Mike Ryan, iSec Partners, 2013. \begin{enumerate}  \item \textit{Zigbee Exploited. The good, the bad and the ugly.}, Tobias Zillner, Cognosec, 2015.  Access 26.06.2016    \end{enumerate}  \textit{LoRa Security. Building a Secure LoRa Solution.},Robert Miller, MWR Labs, 2016. \begin{enumerate}  \item \texit{Bluetooth: With Low Energy comes Low Security.}, Mike Ryan, iSec Partners, 2013.  Access 26.06.2016    \end{enumerate}  \begin{enumerate}  \item \textit{LoRa Security. Building a Secure LoRa Solution.},Robert Miller, MWR Labs, 2016. Access 26.06.2016   \end{enumerate}  \begin{enumerate}  \item  \textit{6LoWPAN demystified.},Jonas Olsson, Texas Instruments, 2014. Access 26.06.2016 \end{enumerate}  \begin{enumerate}  \item  \textit{Cellular networks for massive IoT.}, Author Unspecified, Ericsson, 2016. Access 26.06.2016 \end{enumerate}