References
- V. Ramachandran, BackTrack5 Wireless Pentration Testing, PACKT, Sep 2011.
- AirTight Networks, "All you wanted to know about WiFi rogue access points," Available at www.airtightnetworks.com, 2010.
- H. Mustafa and W. Xu, "CETAD: Detacting Evil Twin access point attacks in wireless hotspots," Proceedings of IEEE CCNS, 2014.
- T. Farooq et al., "MAC layer DoS attacks in IEEE 802.11 networks," Proceedings of PGNet, June 2010.
- SYWorks Programming, "WAIDPS [Wireless Auditing, Intrusion Detection & Prevention System]," Available at syworks.blogspot.kr, 2014