1. Harris M et al (2012) Mobile and connected device security considerations: a dilemma for small and medium enterprise business mobility?
2. Trudeau P, Laroche S (2014) U.S. Patent No. 8,885,539. U.S. Patent and Trademark Office, Washington, DC
3. Sari A, Karay M (2015) Comparative analysis of wireless security protocols: WEP vs WPA. Inter J Commun Netw Syst Sci 8(12):483
4. Tsitroulis A, Lampoudis D, Tsekleves E (2014) Exposing WPA2 security protocol vulnerabilities. IJICS 6(1):93–107
5. Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: SIGSAC conference on computer and communications security, pp 1313–1328