Moving 2 Mishap: M2M's Impact on Privacy and Safety. Bailey, D., A. IEEE Security & Privacy, 10(1):84-87, IEEE, 1, 2012.
Website abstract bibtex The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.
@article{
title = {Moving 2 Mishap: M2M's Impact on Privacy and Safety},
type = {article},
year = {2012},
identifiers = {[object Object]},
keywords = {mobile,mobile-phone,privacy,security,smartphone},
pages = {84-87},
volume = {10},
websites = {http://dx.doi.org/10.1109/msp.2012.16},
month = {1},
publisher = {IEEE},
id = {b471266e-9bfd-388a-8948-6e47e199904b},
created = {2018-07-12T21:32:10.760Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:10.760Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {bailey:m2m},
source_type = {article},
notes = {interesting - embedded devices with cellular radios can be tracked and have an OID-like field that can allow targeting of particular vendors' devices.},
private_publication = {false},
abstract = {The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.},
bibtype = {article},
author = {Bailey, D A},
journal = {IEEE Security & Privacy},
number = {1}
}
Downloads: 0
{"_id":"2rhs4Q5kEE6m6xEFh","bibbaseid":"bailey-moving2mishapm2msimpactonprivacyandsafety-2012","downloads":0,"creationDate":"2019-02-15T15:15:00.921Z","title":"Moving 2 Mishap: M2M's Impact on Privacy and Safety","author_short":["Bailey, D., A."],"year":2012,"bibtype":"article","biburl":null,"bibdata":{"title":"Moving 2 Mishap: M2M's Impact on Privacy and Safety","type":"article","year":"2012","identifiers":"[object Object]","keywords":"mobile,mobile-phone,privacy,security,smartphone","pages":"84-87","volume":"10","websites":"http://dx.doi.org/10.1109/msp.2012.16","month":"1","publisher":"IEEE","id":"b471266e-9bfd-388a-8948-6e47e199904b","created":"2018-07-12T21:32:10.760Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:10.760Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"bailey:m2m","source_type":"article","notes":"interesting - embedded devices with cellular radios can be tracked and have an OID-like field that can allow targeting of particular vendors' devices.","private_publication":false,"abstract":"The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.","bibtype":"article","author":"Bailey, D A","journal":"IEEE Security & Privacy","number":"1","bibtex":"@article{\n title = {Moving 2 Mishap: M2M's Impact on Privacy and Safety},\n type = {article},\n year = {2012},\n identifiers = {[object Object]},\n keywords = {mobile,mobile-phone,privacy,security,smartphone},\n pages = {84-87},\n volume = {10},\n websites = {http://dx.doi.org/10.1109/msp.2012.16},\n month = {1},\n publisher = {IEEE},\n id = {b471266e-9bfd-388a-8948-6e47e199904b},\n created = {2018-07-12T21:32:10.760Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:10.760Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {bailey:m2m},\n source_type = {article},\n notes = {interesting - embedded devices with cellular radios can be tracked and have an OID-like field that can allow targeting of particular vendors' devices.},\n private_publication = {false},\n abstract = {The rapidly evolving technology of embedded cellular devices has led to weaknesses that attackers could exploit to compromise our privacy and safety.},\n bibtype = {article},\n author = {Bailey, D A},\n journal = {IEEE Security & Privacy},\n number = {1}\n}","author_short":["Bailey, D., A."],"urls":{"Website":"http://dx.doi.org/10.1109/msp.2012.16"},"bibbaseid":"bailey-moving2mishapm2msimpactonprivacyandsafety-2012","role":"author","keyword":["mobile","mobile-phone","privacy","security","smartphone"],"downloads":0},"search_terms":["moving","mishap","m2m","impact","privacy","safety","bailey"],"keywords":["mobile","mobile-phone","privacy","security","smartphone"],"authorIDs":[]}