1. CPP: UK wireless network hijacking, a CPP white paper. (CPP, 2010). . Accessed 25 Jun 2013
http://www.slideshare.net/CPPUK/uk-wireless-network-hijacking-2010
2. AirTight Networks: Wireless (in)security trends in the enterprise. (Airtight Networks, 2009). . Accessed 25 Jun 2013
http://go.airtightnetworks.com/Wireless-InSecurity-Trends-in-the-Enterprise.html
3. AirTight Networks: Financial districts wireless vulnerability study. (Airtight Networks, 2009). . Accessed 25 Jun 2013
http://www.airtightnetworks.com/fileadmin/pdf/resources/Financial_Districts_--_WiFi_Scan_-_Version_8.pdf
4. Milliken J: An investigation into MAC-layer intrusion detection strategies for open-access wireless LANs, Thesis. Belfast: Queen's University; 2012.
5. Hu H, Myers S, Colizza V, Vespignani A: WiFi networks and malware epidemiology. Proc Natl Acad Sci U S A 2009, 106(5):1318-1323. 10.1073/pnas.0811973106