[1]
M. R. A. . S. P. B. S. S., “Survey on Security Management of Multiple Spoofing Attackers in Wireless Networks”, IJRITCC, vol. 2, no. 11, pp. 3514–3516, Nov. 2014.