. . . "FIG. 10 is a flowchart depicting an operational scenario which utilizes a wireless intrusion prevention system (WIPS) to terminate a wireless link responsive to a valid signature." .