1. Adelstein, F., Alla, P., Joyce, R., Richard, G.G. III: Physically locating wireless intruders. In: ITCC ’04: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), Washington, DC, USA, vol. 2, p. 482. IEEE Computer Society, Los Alamitos (2004)
2. AirDefense, Inc.: AirDefense Enterprise Product Homepage,
http://www.airdefense.net/products/enterprise.php
3. Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), pp. 775–784 (2000)
4. Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: SSYM’03: Proceedings of the 12th Conference on USENIX Security Symposium (Berkeley, CA, USA), p. 2. USENIX Association, Berkeley (2003)
5. Bestavros, A., Bradley, A., Kfoury, A., Ocean, M.: SNBENCH: a development and run-time platform for rapid deployment of sensor network applications. In: IEEE International Workshop on Broadband Advanced Sensor Networks (Basenets), October (2005)