Y. Mualla, W. Bai, S. Galland, and C. Nicolle. Procedia Computer Science, (2018)The 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018) / Affiliated Workshops.
Mwathi. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I):
20-28(January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
A. Pintus, F. Paternò, and C. Santoro. WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Volume 2, page 175--180. (2010)
K. Sousa, H. Mendonça, and J. Vanderdonckt. Task Models and Diagrams for User Interface Design, volume 5963 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)