Perpetrate network attacks from mobile devices | IEEE Conference Publication | IEEE Xplore