http://www.w3.org/ns/prov#value | - Configuring a notebook computer to impersonate alegitimate access point for a public wireless hot spot, such as a coffee shop or an airport first-class lounge,allows client connections to be attracted and sensitive data captured from unsuspected patrons [Bib05,Shm08].
|