[1]
Hammal Mangal and Muhammad Usman, “Detection and Mitigation of MAC Spoofing”, LC-JSTEM, vol. 1, no. 2, pp. 1-5, Jul. 2020.