REFERENCES
- Arbaugh , W. A. “An inductive chosen plaintext attack against wep/wep2,” . 802.11 group meeting . May 14–18 2001 , Orlando .
- Borisov, N., Goldberg, I., & Wagner, D. (2001) Intercepting Mobile Communications: The Insecurity of 802.11. ACM SIGMOBILE, Retrieved August 25, 2006 from http://www.citeseer.nj.nec.com/article/borisov01intercepting.html
- Cache, J., Moore, H. D., & Skape, (2006) Exploiting 802.11 Wireless Driver Vulnerabilities on Windows. Retrieved 4 February 2007 from http://uninformed.org/index.cgi?v=6&a=2
- Cain & Abel Software (2005) Version 5.9.6. Retrieved August 15, 2005 from www.oxidt.it
- Campbell , P. , Calvert , B. and Boswell , S. 2003 . Security+ guide to network security fundamentals. , Canada : Thomson Course Technology .
- Earle , A. E. 2006 . Wireless security handbook. , New York : Auerbach Publications, Taylor & Francis Group .
- Ethereal Software (2006) Version 0.99.0. Retrieved August 25, 2006 from http://www.ethereal.com
- Fluhrer, S., Mantin, I., & Shamir, A. (August 2001) Weaknesses in the key scheduling algorithm of RC4. Eighth Annual Workshop on Selected Areas in Cryptography. August 16–17, 2001, Canada. Retreived August 20, 2006 from www.citeseer.nj.nec.com/fluhrer01weaknesses.html
- Held , G. 2003 . Securing wireless LANs. , Sussex , , England : Wiley .
- Horton , M. and Mugge , C. 2003 . Hack notes–Network security portable reference. , 107 – 118 . California : McGraw-Hill/Osborne .
- Intel Building Blocks for Wireless LAN Security (White Paper), (February 2003).
- Issac , B. , Jacob , S. M. and Mohammed , L. A. The Art of War Driving and Security Threats–A Malaysian Case Study. Proceedings of the IEEE International Conference on Networks (ICON 2005) . November 16–18 2005 , Kuala Lumpur , Malaysia. pp. 124 – 129 .
- LinkFerret Software. (2005) Version 3.06. Retrieved August 20, 2006 from http://www.linkferret.ws/
- Mac Makeup Software. (2005) Version 1.83d. Retrieved August 15, 2006 from http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp
- Mohammed , L. A. and Issac , B. DoS Attacks and Defense Mechanisms in Wireless Networks. Proceedings of the IEE Mobility Conference 2005 (Mobility 2005) . November 15–17 2005 , Guangzhou , China.
- NetStumbler Software. (2005) Version 0.4.0. Retrieved August 15, 2006 from http://www.netstumbler.org
- Packetyzer Software. (2005) Version 4.0.1. Retrieved August 15, 2006. http://www.networkchemistry.com/products/packetyzer/website
- Phifer, L., (2007) WPA PSK Crackers: Loose Lips Sink Ships. Retrieved 2 April 2007 from http://www.wi-fiplanet.com/tutorials/article.php/3667586
- Stubblefield , A. , Ionnidis , J. and Rubin , A. D. Using the Fluhrer, Mantin, and Shamir attack to break WEP. Proceedings of the 2002 Network and Distributed Systems Security Symposium . February 6–8 2002 , California . pp. 17 – 22 .
- Takahashi, T. (2004) WPA passive dictionary attack overview. (White Paper), GTISC Georgia, USA.
- War Driving Data. (2005–2007) Retrieved April 2, 2007 from http://www.viruslist.com/en/analysis?pubid=182068392 and ?pubid=175676429 and ?pubid=187008611 and pubid=204791934