Research Article

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

Figure 4

The first victim connected to the rogue access point.
218271.fig.004