Communication by terrorist using access points: Cyber security | IEEE Conference Publication | IEEE Xplore