{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:52:25Z","timestamp":1775145145146,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319094649","type":"print"},{"value":"9783319094656","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09465-6_20","type":"book-chapter","created":{"date-parts":[[2014,9,24]],"date-time":"2014-09-24T15:12:53Z","timestamp":1411571573000},"page":"185-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Real Time Wireless Packet Monitoring with\u00a0Raspberry Pi Sniffer"],"prefix":"10.1007","author":[{"given":"Yusuf","family":"Turk","sequence":"first","affiliation":[]},{"given":"Onur","family":"Demir","sequence":"additional","affiliation":[]},{"given":"Sezer","family":"G\u00f6ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,25]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"N.T. Anh, R. Shorey, Network sniffing tools for WLANs: Merits and limitations, in IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005, 23\u201325 January 2005. doi:10.1109\/ICPWC.2005.1431372","DOI":"10.1109\/ICPWC.2005.1431372"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"M.J. Jipping, A. Kalafut, N. Kooistra, K. Ludewig, Investigating wired and wireless networks using a java-based programmable sniffer. SIGCSE Bull. 36(3), 12\u201316 (2004), http:\/\/doi.acm.org\/10.1145\/1026487.1008003","DOI":"10.1145\/1026487.1008003"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"K.C.Y. Shum, Q.J. Cheng, J.K.Y. Ng, A signal strength based location estimation algorithm within a wireless network, in IEEE International Conference on Advanced Information Networking and Applications (AINA), 22\u201325 March 2011. doi:10.1109\/AINA.2011.80.","DOI":"10.1109\/AINA.2011.80."},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"K.C.Y. Shum, J.K.-Y. Ng, Q.J. Cheng, The design and implementation of a wireless location estimation system in a wireless local area network, in 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 26\u201329 March 2012. doi:10.1109\/WAINA.2012.169","DOI":"10.1109\/WAINA.2012.169"},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"K.C. Shum, J.K. Ng, Detecting, locating, and tracking hacker activities within a WLAN network, in 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), 23\u201325 August 2010. doi:10.1109\/RTCSA.2010.46","DOI":"10.1109\/RTCSA.2010.46"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"T. Henderson, D. Kotz, I. Abyzov, The changing usage of a mature campus-wide wireless network, in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom \u201904) (ACM, New York, USA, 2004), pp. 187\u2013201, http:\/\/doi.acm.org\/10.1145\/1023720.1023739","DOI":"10.1145\/1023720.1023739"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"D. Boughaci, K. Ider, S. Yahiaoui, Design and implementation of a misused intrusion detection system using autonomous and mobile agents, in Proceedings of the 2007 Euro American conference on Telematics and information systems (EATIS \u201907) (ACM, New York, USA, 2007), Article 12, p. 8, http:\/\/doi.acm.org\/10.1145\/1352694.1352707","DOI":"10.1145\/1352694.1352707"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"R. Henders, B. Opdyke, Detecting intruders on a campus network: might the threat be coming from within? in Proceedings of the 33rd Annual ACM SIGUCCS Fall Conference(SIGUCCS \u201905) (ACM, New York, USA, 2005), pp. 113\u2013117, http:\/\/doi.acm.org\/10.1145\/1099435.1099461","DOI":"10.1145\/1099435.1099461"},{"key":"20_CR9","unstructured":"http:\/\/www.tcpdump.org\/ retrieved 15\/12\/2013"},{"key":"20_CR10","unstructured":"http:\/\/www.wireshark.org\/ retrieved 15\/12\/2013"},{"key":"20_CR11","unstructured":"http:\/\/www.wildpackets.com\/products\/ retrieved 15\/12\/2013"},{"key":"20_CR12","unstructured":"http:\/\/wiki.openwrt.org\/toh\/start retrieved 04\/06\/2014"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"A.M. Polli, M. Korn, C.N. Klokmose, Local area artworks: collaborative art interpretation on-site, in Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp \u201913 Adjunct) (ACM, New York, USA, 2013), pp. 79\u201382. http:\/\/doi.acm.org\/10.1145\/2494091.2494114","DOI":"10.1145\/2494091.2494114"},{"key":"20_CR14","unstructured":"http:\/\/www.raspberrypi.org\/ retrieved 22\/04\/2014"},{"key":"20_CR15","unstructured":"http:\/\/www.tcpdump.org\/pcap.html retrieved 22\/04\/2014"},{"key":"20_CR16","unstructured":"http:\/\/wireless.kernel.org\/en\/users\/Documentation\/modes retrieved 22\/04\/2014"},{"key":"20_CR17","unstructured":"Y. Turk, Wireless Sniffer System. Senior Project Report (Yeditepe University, Istanbul, 2013)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"http:\/\/nodejs.org\/ retrieved 04\/01\/2014","DOI":"10.9790\/3013-040401-03"},{"key":"20_CR19","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Push_technology retrieved 22\/04\/2014"}],"container-title":["Information Sciences and Systems 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09465-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T22:59:55Z","timestamp":1674169195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09465-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319094649","9783319094656"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09465-6_20","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}