Research Article

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

Figure 6

Wireless victims connected to the rogue access point.
218271.fig.006