2006 | ||
---|---|---|
3 | Michael Sthultz, Jacob Uecker, Hal Berghel: Wireless Insecurities. Advances in Computers 67: 226-253 (2006) | |
2005 | ||
2 | EE | Hal Berghel, Jacob Uecker: WiFi attack vectors. Commun. ACM 48(8): 21-28 (2005) |
2004 | ||
1 | EE | Hal Berghel, Jacob Uecker: Wireless infidelity II: airjacking. Commun. ACM 47(12): 15-20 (2004) |
1 | Hal Berghel | [1] [2] [3] |
2 | Michael Sthultz | [3] |