1. Security Threats in Wi-Fi Networks;Masiukiewicz;Engineering and Science,2016
2. Penetration testing: concepts, attack methods, and defense strategies;Denis;In Long Island Systems Applications and Technology Conference (LISAT),2016
3. Short Paper: Exploiting WPA2-Enterprise Vendor Implementation Weaknesses through Challenge Response Oracles;Robyns;ACM Conference on Security and privacy in wireless & mobile networks,2014
4. Audit for information systems security;Suduc;Informatica Economica,2010