[1]
L. Rajn, N. Pavlovic, and Šemsudin Plojović, “Penetration testing of WPA and WPA2 security protocols and analysis of security solutions”, ASHU- ES, vol. 22, no. 1, Jun. 2022.