Wireless LAN (WLAN) spoofing detection methods - Analysis and the victim Silent case | IEEE Conference Publication | IEEE Xplore