Cut the cord : forensic evidence by exploiting wireless vulnerabilities

Source
Wireless and Mobile Networking Conference (WMNC), Joint IFIP- () p. 63-67
Author(s)