1. M. Virendra, S. Upadhyaya, Securing information through trust management in wireless networks, in: The Workshop on Secure Knowledge Management, 2004, pp. 201–206.
2. F. Guo, T. Chiueh, Sequence number-based MAC address spoof detection, in: Advances in Intrusion Detection Recent, 2006, pp. 309–329.
3. A framework for detecting MAC and IP spoofing attacks with network characteristics;Kim,2016
4. Spoofing detection in IEEE 802.15.4 networks based on received signal strength;Jokar,2013
5. Using constant traffic to specific IP destinations for detecting spoofed MAC addresses in local area networks;Sasu,2010