UAV weaknesses against deauthentication based hijacking attacks | IEEE Conference Publication | IEEE Xplore