[2] MekhazniaTahar, Zidani Abdelmadjid, Wi-Fi security analysis, Proceedings of the International Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015),Vol.73, pp. 172-178, DOI: 10.1016/j.procs.2015.12.009, Tunisia, 201510.1016/j.procs.2015.12.009
[4] Dariusz Czerwiński, Jarosław Nowak, Field propagation of jamming sources in WiFi networks, Proceedings of the 2017 International Conference on Electromagnetic Devices and Processes in Environment Protection with Seminar Applications of Superconductors (ELMECO &AoS), DOI: 10.1109/ELMECO.2017.8267715, 2018, Performance Evaluation, Vol. 75-76, pp 50-68, DOI: 10.1016/j.peva.2014.02.002, 201410.1016/j.peva.2014.02.002