(1)
Корольков, Р. Ю.; Куцак, С. В. The Features of a Deauthentication Attack Implementation in Networks 802.11. Zahist ìnf. 2019, 21, 175-181.