1. Ferreri, F., Bernaschi, M., Valcamonici, L.: Access points vulnerabilities to dos attacks in 802.11 networks. In: IEEE Wireless Communications and Networking Conference, pp. 634–638 (2004)
2. Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX Security Symposium, pp. 15–28 (2003)
3. Faria, D., Cheriton, D.: Detection of identity-based attacks in wireless networks using signal prints. In: IEEE Green Computing and Communications (GreenCom), IEEE/ACM International Conference on and International Conference on Cyber, Physical and Social Computing (CPSCom), pp. 35–41 (2010)
4. Li, Q., Trappe, W.: Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks. In: IEEE Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), vol. 1 (2006)
5. Khurana, P., Sharma, A., Singh, P.K.: A systematic Analysis on mobile application software vulnerabilities: issues and challenges. Indian J. Sci. Technol. 9(32), 1–6 (2016)