共 14 条
[1]
Almaarif A., 2020, INT J ADV SCI ENG IN, V10, P1874
[2]
Amewuda A. B., 2018, J COMPUT NETWORKS CO
[3]
Chughtai, 2017, INT J SCI TECHNOLOGY, V6, P275
[4]
Jordan R, 2002, IEEE ANTENN PROPAG M, V44, P185, DOI [10.1109/74.997963, 10.1109/74.997962]
[5]
A Literature Review of Security Threats to Wireless Networks
[J].
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING,
2014, 7 (04)
:25-34
[6]
Li Wang, 2011, Journal of Networks, V6, P470, DOI 10.4304/jnw.6.3.470-481
[7]
Noman S. A., 2017, INT J COMPUTER SCI I, V14, P60
[8]
Priandoyo A., 2006, JURNAL TEKNIK INFORM, V1, P73
[9]
Rathore B., 2006, Information Systems Security Assessment Framework (ISSAF) Draft 0.2.1
[10]
Rinaldi R., 2019, THESIS U MERCU BUANA