1 |
V. Ramachandran, BackTrack5 Wireless Pentration Testing, PACKT, Sep 2011.
|
2 |
AirTight Networks, "All you wanted to know about WiFi rogue access points," Available at www.airtightnetworks.com, 2010.
|
3 |
H. Mustafa and W. Xu, "CETAD: Detacting Evil Twin access point attacks in wireless hotspots," Proceedings of IEEE CCNS, 2014.
|
4 |
T. Farooq et al., "MAC layer DoS attacks in IEEE 802.11 networks," Proceedings of PGNet, June 2010.
|
5 |
SYWorks Programming, "WAIDPS [Wireless Auditing, Intrusion Detection & Prevention System]," Available at syworks.blogspot.kr, 2014
|