{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T09:48:38Z","timestamp":1776851318389,"version":"3.51.2"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319155081","type":"print"},{"value":"9783319155098","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_24","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"318-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enabling Wireless LAN Troubleshooting"],"prefix":"10.1007","author":[{"given":"Ilias","family":"Syrigos","sequence":"first","affiliation":[]},{"given":"Stratos","family":"Keranidis","sequence":"additional","affiliation":[]},{"given":"Thanasis","family":"Korakis","sequence":"additional","affiliation":[]},{"given":"Constantine","family":"Dovrolis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"24_CR1","unstructured":"Feilu, L., Jian, L., Zhifeng, T., Korakis, T., Erkip, E., Panwar, S.: The hidden cost of hidden terminals. In: Proceedings of ICC (2010)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, W., Lee, S., Jo, D., Ryu, J., Kwon, T., Choi, Y.: An experimental study on the capture effect in 802.11a networks. In: Proceedings of WinTECH (2007)","DOI":"10.1145\/1287767.1287772"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Rayanchu, S., Mishra, A., Agrawal, D., Saha, S., Banerjee, S.: Diagnosing wireless packet losses in 802.11: separating collision from weak signal. In: Proceedings of INFOCOM (2008)","DOI":"10.1109\/INFOCOM.2008.124"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Adib, F., Katabi, D., Seshan, S.: Clearing the RF smog: making 802.11N robust to cross-technology interference. In: Proceedings of SIGCOMM (2011)","DOI":"10.1145\/2018436.2018456"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Lakshminarayanan, K., Sapra, S., Seshan, S., Steenkiste, P.: RFDump: an architecture for monitoring the wireless ether. In: Proceedings of CoNEXT (2009)","DOI":"10.1145\/1658939.1658968"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Lakshminarayanan, K., Seshan, S., Steenkiste, P.: Understanding 802.11 performance in heterogeneous environments. In: Proceedings of HomeNets (2011)","DOI":"10.1145\/2018567.2018577"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2096149.2096151","volume":"42","author":"P Kanuparthy","year":"2012","unstructured":"Kanuparthy, P., Dovrolis, C., Papagiannaki, K., Seshan, S., Steenkiste, P.: Can user-level probing detect and diagnose common home-WLAN pathologies. SIGCOMM CCR 42(1), 7\u201315 (2012)","journal-title":"SIGCOMM CCR"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Rayanchu, S., Patro, A., Banerjee, S.: Airshark: detecting non-WiFi RF devices using commodity WiFi hardware. In: Proceedings of IMC (2011)","DOI":"10.1145\/2068816.2068830"},{"key":"24_CR9","unstructured":"Rayanchu, S., Patro, A., Banerjee, S.: Catching whales and minnows using WiFiNet: deconstructing non-WiFi interference using WiFi hardware. In: Proceedings of NSDI (2012)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Bellardo, J., Benk\u00f6, P., Snoeren, A., Voelker, G., Savage, S.: Jigsaw: solving the puzzle of enterprise 802.11 analysis. In: Proceedings of SIGCOMM (2006)","DOI":"10.1145\/1159913.1159920"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Chandra, R., Padmanabhan, V., Zhang, M.: WiFiProfiler: cooperative diagnosis in wireless LANs. In: Proceedings of MobiSys (2006)","DOI":"10.1145\/1134680.1134702"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs. In: Proceedings of MobiSys (2006)","DOI":"10.1145\/1134680.1134701"},{"key":"24_CR13","unstructured":"Shrivastava, V., Rayanchu, S., Banerjee, S., Papagiannaki, K.: PIE in the sky: online passive interference estimation for enterprise WLANs. In: Proceedings of NSDI (2011)"},{"issue":"5","key":"24_CR14","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1109\/TNET.2010.2051038","volume":"18","author":"D Giustiniano","year":"2010","unstructured":"Giustiniano, D., Malone, D., Leith, D., Papagiannaki, K.: Measuring transmission opportunities in 802.11 links. IEEE\/ACM Trans. Netw. 18(5), 1516\u20131529 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"24_CR15","unstructured":"Wireless Chipsets Drivers. http:\/\/wireless.kernel.org\/en\/users\/Drivers"},{"key":"24_CR16","unstructured":"Jangeun, J., Peddabachagari, P., Sichitiu, M.: Theoretical maximum throughput of IEEE 802.11 and its applications. In: Proceedings of NCA (2003)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Heusse, M., Rousseau, F., Berger-Sabbatel, G., Duda, A.: Performance anomaly of 802.11b. In: Proceedings of INFOCOM (2003)","DOI":"10.1109\/INFCOM.2003.1208921"},{"issue":"3","key":"24_CR18","first-page":"535","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE JSAC 18(3), 535\u2013547 (2000)","journal-title":"IEEE JSAC"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:30:24Z","timestamp":1675261824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}