1. Gon. An introduction to 802.11(WI-FI) technologies (2015). http://www.4gon.co.uk/solutions/introduction_to_802_11_wifi.php . Accessed 18 Nov 2015
2. Agarwal, M., Biswas, S., Nandi, S.: Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks. IEEE Commun. Lett. 19(4), 581–584 (2015)
3. aircrack-ng: Cafe Latte attack (2010). http://www.aircrack-ng.org/doku.php?id = cafe-latte . Accessed 15 April 2016
4. aircrack-ng: Introduction (2016). http://www.aircrack-ng.org/doku.php?id = Main&DokuWiki = g339gdvjfup8lor0t66mv4ie63 . Accessed 29 Apr 2016
5. Vijay, B.P., Pranit, S.T., Swapnil, D.D.: Protecting Wi-Fi networks from rogue access points. In: 4th International Conference on Advances in Recent Technologies in, Bangalore, India, 2012, pp. 119–122 (2012)