M. Borella, D. Grabelsky, J. Lo, and K. Taniguchi, Realm Specific IP: Protocol Specification, RFC 3103 (Experimental), 2001.
DOI : 10.17487/rfc3103

P. Chandra, How To Make A WiFi Antenna Out of A Pringles Can. makeuseof.com http://www.makeuseof.com/tag/how-to-make-a-wifi-antenna-out- of-a-pringles-can-nb, 2009.

A. Herzberg and H. Shulman, Stealth DoS attacks on secure channels, In: NDSS, 2010.

L. Joncheray, A simple active attack against TCP, Proceedings of the 5th Symposium on UNIX Security. pp. 7?20. USENIX Association, 1995.

A. Lam and A. , Anagnostakis: Puppetnets: Misusing web browsers as a distributed attack infrastructure, SIGSAC: 13th ACM Conference on Computer and Communications Security, 2006.

. Sherwood, . Bhattacharjee, and . Braud, Misbehaving TCP receivers can cause internetwide congestion collapse, SIGSAC: 12th ACM Conference on Computer and Communications Security, 2005.
DOI : 10.1145/1102120.1102170

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.5912

R. Vaughn and G. Evron, DNS amplification attacks, ISOTF, 2006.

M. Wong and A. Clement, Sharing Wireless Internet in Urban Neighbourhoods, pp.275-294, 2007.
DOI : 10.1007/978-1-84628-905-7_15

URL : https://tspace.library.utoronto.ca/bitstream/1807/32135/1/CRACIN%20Working%20Paper%20No%2019.pdf

B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, pp. 103?135. Signals and Communication Technology, 2007.
DOI : 10.1007/978-0-387-33112-6_5