HTML 4.01 Specification, 1999. ,
Penetration testing: Concepts, attack methods, and defense strategies, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp.1-6, 2016. ,
DOI : 10.1109/LISAT.2016.7494156
Wireless network attack: Raising the awareness of Kampung WiFi residents, 2012 International Conference on Computer & Information Science (ICCIS), pp.736-740, 2012. ,
DOI : 10.1109/ICCISci.2012.6297124
ARP Poisoning Attack and Mitigation Tech- niques, 2016. ,
User-side Wi-Fi evil twin attack detection using random wireless channel monitoring, MILCOM 2016, 2016 IEEE Military Communications Conference, pp.1243-1248, 2016. ,
DOI : 10.1109/MILCOM.2016.7795501
Dangerous Wi-Fi access point: attacks to benign smartphone applications, Personal and Ubiquitous Computing, vol.55, issue.4, pp.1373-1386, 2014. ,
DOI : 10.1109/TPC.2012.2208392
Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study, 2013 IEEE Conference on Communications and Network Security (CNS), pp.430-437, 2013. ,
DOI : 10.1109/CNS.2013.6682757
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices, 2012 7th International Conference on Malicious and Unwanted Software, pp.87-93, 2012. ,
DOI : 10.1109/MALWARE.2012.6461013
Taxonomy of Man-in-the-Middle Attacks on HTTPS, 2016 IEEE Trustcom/BigDataSE/ISPA, pp.527-534, 2016. ,
DOI : 10.1109/TrustCom.2016.0106
Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment, Eighth IEEE Workshop on Mobile Computing Systems and Applications, pp.9-13, 2007. ,
DOI : 10.1109/HotMobile.2007.12
Okhttp wiki), https://github.com/square, 2014. ,