@incollection{, A9431C8375853E9621FA22D71AF94BFB , author={{Gerardo Alberto CastangMontiel.} and {Fernando BetancourtDuque} and {Luz Adriana PeñaSalazar}}, journal={{Global Journal of Researches in Engineering}}, journal={{GJRE}}2249-45960975-586110.34257/gjre, address={Cambridge, United States}, publisher={Global Journals Organisation}2211323 } @incollection{b0, , title={{Hacking y seguridad de páginas web}} , author={{ ARamos } and { CBarbero } and { RMartínez } and { AGarcía } and { JGonzález }} , journal={{Colombia: Ediciones U}} , year={2015} } @book{b1, , title={{Desarrollo de aplicaciones móviles con Android. Segunda edición. Colombia: Ediciones U, Ra -Ma}} , author={{ JNolasco }} , year={2016} } @book{b2, , title={{Security+ Guide to Networks Security Fundamentals. Sexta edición}} , author={{ MCiampa }} , year={2018} , publisher={Cengage} , address={Boston, USA} } @book{b3, , title={{Bluetooth Security Attacks: Comparative analysis, attacks and countermeasures}} , author={{ KHaataja } and { KHypponen } and { SPasanen } and { PToivanen }} , year={2013} , publisher={Springer} , address={Finlandia} } @book{b4, , title={{Principles of Computer Security: CompTIA Security+ and Beyond}} , author={{ AConkin } and { GWhite } and { CCothren } and { RDavis } and { DWilliams }} , year={2018} , publisher={McGraw Hill Professional} , address={USA} } @incollection{b5, , title={{Bluetooth Security Threats and Solutions: A Survey}} , author={{ NMinar } and { MTarique }} , journal={{International Journal of Distributed and Parallel Systems}} , year={2012} , note={IJDPS} } @book{b6, , title={{Bluetooth IoT Applications: From BLE to Mesh. USA: IoT for all}} , author={{ MWeed }} , year={2018} } @book{b7, , title={{Hablemos de Spoofing. Hacking Ético}} , author={{ CGarcía }} , year={2010} } @book{b8, , title={{The Hacks of Mr. Robot: How to Hack Bluetooth}} , author={{ Occupytheweb }} , year={2016} , address={Los Angeles, California} , note={Wonder How To. Recuperado de} } @incollection{b9, , title={{Conoce android studio. USA: Developers Android}} , author={{ AMitra }} , booktitle={{What is Bluestack Attack}} , year={2017. 2019} , note={The Security Buddy. Recuperado de} } @book{b10, , title={{Documentation, android.bluetooth. USA: Developers Android}} , author={{ Android }} , year={2019} } @book{b11, , author={{ AlmaDel Cid } and { RMéndez } and { FSandoval }} , title={{Investigación. Fundamentos y metodología}} , year={2011} } @book{b12, , title={{}} , author={{ Segunda Edición } and { México }} , publisher={Pearson} } @book{b13, , title={{Este "error" en el Bluetooth pone en riesgo tu celular}} , author={{ Adn Sureste }} , year={2019} } @book{b14, , title={{Advierten sobre los peligros de utilizar el Bluetooth de tu celular}} , author={{ Clarín }} , year={2019} , address={Buenos Aires, Argentina. Recuperado de} } @book{b15, , title={{Se descubre una "grave vulnerabilidad" en Bluetooth que deja expuestos los dispositivos a posibles ataques}} , author={{ RÁlvarez }} , year={2017} } @incollection{b16, , title={{Esto es lo que puede pasar si tienes el bluetooth del móvil siempre conectado}} , author={{ GCarro }} , journal={{Revista GQ. España}} , year={2019} , note={Recuperado de} }