1 I. Oppermann, "제목없음" 2004
2 강유성, "무선랜 보안기술의 진화동향 및 전망" 18 (18): 33-46, 2003
3 W. Arbaugh, "Your 802.11 Wireless Network has No Clothes" 2001
4 T. Schmoyer, "Wireless Intrusion Detection and Response, A case study using the classic man-in-the-middle attack" 883-888, 2004
5 "Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements. Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specificatioins" 2003
6 R. Beyah, "Rogue Access Point Detection using Temporal Traffic Characteristics" IEEE Communication Society 2004
7 H. Yang, "Intrusion Detection for Wireless Local Area Network" 1949-1952, 2004
8 Y. Zhang, "Intrusion Detection Techniques for Mobile Wireless Networks," 9 (9): 545-556, 2003
9 윤상식, "IEEE 802.11에서 NAV에 기반한 전력관리 기법" 523-525, 2004
10 J. Wright, "Detecting Wireless LAN MAC Address Spoofing"
1 I. Oppermann, "제목없음" 2004
2 강유성, "무선랜 보안기술의 진화동향 및 전망" 18 (18): 33-46, 2003
3 W. Arbaugh, "Your 802.11 Wireless Network has No Clothes" 2001
4 T. Schmoyer, "Wireless Intrusion Detection and Response, A case study using the classic man-in-the-middle attack" 883-888, 2004
5 "Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements. Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specificatioins" 2003
6 R. Beyah, "Rogue Access Point Detection using Temporal Traffic Characteristics" IEEE Communication Society 2004
7 H. Yang, "Intrusion Detection for Wireless Local Area Network" 1949-1952, 2004
8 Y. Zhang, "Intrusion Detection Techniques for Mobile Wireless Networks," 9 (9): 545-556, 2003
9 윤상식, "IEEE 802.11에서 NAV에 기반한 전력관리 기법" 523-525, 2004
10 J. Wright, "Detecting Wireless LAN MAC Address Spoofing"
11 "Airopeek Getting Started Guide"
12 M. Gast, "802.11® Wireless Networks The Definitive Guide 2nd edition" O'Reilly 2005