1. A. Aaroud , M.A. El Houssaini , A.E. Hore , and J.B. Othman . 2017. Real-time detection of MAC layer misbehavior in mobile ad hoc networks . In proc. of Applied Computing and Informatics , Vol. 13 , 1 ( 2017 ), 1--9. A. Aaroud, M.A. El Houssaini, A.E. Hore, and J.B. Othman. 2017. Real-time detection of MAC layer misbehavior in mobile ad hoc networks. In proc. of Applied Computing and Informatics , Vol. 13, 1 (2017), 1--9.
2. Daniele Antonioli , Sandra Siby , and Nils Ole Tippenhauer . 2017 . Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN . In Proc. of Conference on Cryptology And Network Security (CANS) . Daniele Antonioli, Sandra Siby, and Nils Ole Tippenhauer. 2017. Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN. In Proc. of Conference on Cryptology And Network Security (CANS) .
3. Urbi Chatterjee , Rajat Sadhukhan , Debdeep Mukhopadhyay , Rajat Subhra Chakraborty , Debashis Mahata, and Mukesh. M. Prabhu. 2020 . Stupify : A Hardware Countermeasure of KRACKs in WPA2 Using Physically Unclonable Functions (In proc. of WWW '20). ACM, New York, NY, USA. Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, and Mukesh. M. Prabhu. 2020. Stupify: A Hardware Countermeasure of KRACKs in WPA2 Using Physically Unclonable Functions (In proc. of WWW '20). ACM, New York, NY, USA.
4. Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
5. Cas Cremers , Benjamin Kiesl , and Niklas Medinger . 2020 . A Formal Analysis of IEEE 802.11textquoterights WPA2: Countering the Kracks Caused by Cracking the Counters . In 29th USENIX Security Symposium . USENIX Association, 1--17 . Cas Cremers, Benjamin Kiesl, and Niklas Medinger. 2020. A Formal Analysis of IEEE 802.11textquoterights WPA2: Countering the Kracks Caused by Cracking the Counters. In 29th USENIX Security Symposium . USENIX Association, 1--17.