[1]
A. A. . Kumar, A. K. . Mohan, and P. P. . Amritha, “Deceiving Attackers in Wireless Local Area Networks Using Decoys”, JCSANDM, vol. 7, no. 1-2, pp. 201–214, Jan. 2018.