Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks | IEEE Conference Publication | IEEE Xplore