1. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, S64–S73 (2010)
2. IEEE Computer Society.: IEEE Standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part II: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. In: IEEE Std 802.11TM-2007 (2007)
3. Mavridis, I.P., Androulakis, I.E., Halkias, A.B., Mylonas, P.H.: Real-life paradigms of wireless network security attacks. In: Proceedings 2011 Panhellenic Conference on Informatics, PCI 2011, pp. 112–116, art. No. 6065074, ISBN: 978-076954389-5
4. Delaune, S., Jacquemard, F.: A theory of dictionary attacks and its complexity. In: Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 2–15. Cambridge, UK (2004)
5. Hu, G., Ma, J., Huang, B.: Password recovery for rar files using CUDA. Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 486–490. Chengdu, China (2009)