Research Article

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

Figure 8

The chosen encrypted data frame.
218271.fig.008