http://securityaffairs.co/wordpress/38234/hacking/802-11n-flaw.html
Fortunately, there are several methods to mitigate the attacks, including
MAC layer encryption, disabling Aggregated Mac Protocol Data Unit (A-MPDU)
frame aggregation, configuring the system to drop corrupted A-MPDUs, the
http://securityaffairs.co/wordpress/38234/hacking/802-11n-flaw.html
Fortunately, there are several methods to mitigate the attacks, including MAC
layer encryption, disabling Aggregated Mac Protocol Data Unit (A-MPDU) frame
aggregation, configuring the system to drop corrupted A-MPDUs, the use