(1)
Tackling Spoofing Attacks Using Broadband Access Concentrators . IJIEE 2012, 2 (2), 136-140.