![]() |
| 2006 | ||
|---|---|---|
| 3 | Michael Sthultz, Jacob Uecker, Hal Berghel: Wireless Insecurities. Advances in Computers 67: 226-253 (2006) | |
| 2005 | ||
| 2 | EE | Hal Berghel, Jacob Uecker: WiFi attack vectors. Commun. ACM 48(8): 21-28 (2005) |
| 2004 | ||
| 1 | EE | Hal Berghel, Jacob Uecker: Wireless infidelity II: airjacking. Commun. ACM 47(12): 15-20 (2004) |
| 1 | Hal Berghel | [1] [2] [3] |
| 2 | Michael Sthultz | [3] |