[1]
Z. . Nazir, M. . Danish, B. . Ali, S. P. H. . Shah, S. S. . Hasnain, and M. A. . Mujahid, “Analyzing Vulnerabilities and Exploitation in Bluetooth Security of Wireless Communication: A Security Framework”, JIIL, vol. 2, no. 1, pp. 55–74, Jun. 2025.