共 9 条
[1]
Ahmad A, 2005, WIRELESS AND MOBILE DATA NETWORKS, P1, DOI 10.1002/0471729221
[2]
Aircrack-ng Website, 2011, SIMPL WEP CRACK FLOW
[3]
Cache J., 2010, Hacking Exposed Wireless: Wireless Security Secrets Solutions, V2nd
[4]
ColaSoft, 2012, COL PACK BUILD
[5]
Francia III G. A., 2011, P 2011 INT C SEC MAN
[6]
Karma Project, 2011, LIN ROG ACC POINT HO
[7]
Martinovic I, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P36
[8]
Sanders C., 2010, Understanding man-in-the-middle attacks - part 3: Session hijacking
[9]
Schneider Electric, J SER SPREAD SPECTR