S. Goel and S. Kumar, An Improved Method of Detecting Spoofed Attack in Wireless LAN,1 st International NETCOM, pp.104-108, 2009.

K. Sood and M. Eszenyi, Discover how using the IEEE standards approach plugs vulnerabilities and thwarts attacks.http://software.intel.com/en-us/articles/secure- management-of-ieee-80211-wireless-lans, 2008.

N. Bernaschi, M. Ferreri, and L. Valcamonici, Access points vulnerabilities to DoS attacks in 802, Wireless Networks, vol.11, issue.142, pp.159-169, 2008.

A. C. Rumín and C. Guy, VoIP over WLAN 802.11b simulations for infrastructure and adhoc networks, Proceedings LCS 2006, pp.61-64, 2006.

T. Karygiannis and L. Owens, Wireless network security, 802.11, bluetooth and handheld devices: recommendations of the national institute of standards and technology, NIST Special Publication 800-48, 2002.

K. Bicakci and B. Tavli, Denial-of-Service attacks and countermeasures in IEEE 802, 11 wireless networks, Computer Standards and Interfaces, pp.931-941, 2009.

R. Bansal, S. Tiwari, and D. Bansal, Non-cryptographic methods of MAC spoof detection in wireless LAN, 2008 16th IEEE International Conference on Networks, pp.1-6, 2008.
DOI : 10.1109/ICON.2008.4772621

M. Malekzadeh, A. A. Ghani, J. Desa, and S. Subramaniam, Security improvement for management frames in IEEE 802, 11 wireless networks, IJCSNS, 2007.

F. Guo and T. Chiueh, Sequence Number-Based MAC Address Spoof Detection, RAID 2005, pp.309-329, 2006.
DOI : 10.1007/11663812_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.3346

D. Madory, New Methods of Spoof Detection in 802.11b Wireless Networking, 2006.

Q. Li and W. Trappe, Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships, IEEE Transactions on Information Forensics and Security, pp.793-808, 2007.
DOI : 10.1109/TIFS.2007.910236

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.642.3405

D. B. Faria and D. R. Cheriton, Detecting identity-based attacks in wireless networks using signal prints, Proceedings of the 5th ACM workshop on Wireless security, 2006.
DOI : 10.1145/1161289.1161298

I. Ahmad, A. B. Abdullah, and A. S. Alghamdi, Comparative Analysis of Intrusion Detection Approaches, 2010 12th International Conference on Computer Modelling and Simulation, pp.586-591, 2010.
DOI : 10.1109/UKSIM.2010.112

Y. Lim, T. S. Yer, J. Levine, and H. L. Owen, Wireless intrusion detection and response, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., pp.68-75, 2003.
DOI : 10.1109/SMCSIA.2003.1232403

D. Pleskonjic, Wireless Intrusion Detection Systems (WIDS), 19th Annual Computer Security Applications Conference, 2003.

H. Yang, L. Xie, and J. Sun, Intrusion detection solution to WLANs, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, pp.553-556, 2004.

R. L. Ataide and Z. Abdelouahab, An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks, In: Novel Algorithms and Techniques in Telecommunications and Networking, pp.355-360, 2010.

S. Chavan, K. Shah, N. Dave, S. Mukherjee, A. Abraham et al., Adaptive neurofuzzy intrusion detection systems, In: Proceedings of ITCC, vol.1, pp.70-74, 2004.

A. N. Toosi and M. Kahani, A Neuro-Fuzzy Classifier for Intrusion Detection Systems, CSICC, 2006.

I. Ahmad, A. B. Abdullah, and A. S. Alghamdi, Application of artificial neural network in detection of DOS attacks, Proceedings of the 2nd international conference on Security of information and networks, SIN '09, 2009.
DOI : 10.1145/1626195.1626252

C. He and J. C. Mitchell, Security analysis and improvements for IEEE 802.11i, Proc. of the 12th Annual Network and Distributed System Security Symp, pp.90-110, 2005.

I. Ahmad, A. B. Abdullah, and A. S. Alghamdi, Application of artificial neural network in detection of probing attacks, 2009 IEEE Symposium on Industrial Electronics & Applications, pp.557-562, 2009.
DOI : 10.1109/ISIEA.2009.5356382