{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:51:20Z","timestamp":1761562280981,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319673790"},{"type":"electronic","value":"9783319673806"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_68","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:13:35Z","timestamp":1505164415000},"page":"721-733","source":"Crossref","is-referenced-by-count":4,"title":["Practical Results of WLAN Traffic Analysis"],"prefix":"10.1007","author":[{"given":"A.","family":"Paramonov","sequence":"first","affiliation":[]},{"given":"A.","family":"Vikulov","sequence":"additional","affiliation":[]},{"given":"S.","family":"Scherbakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"issue":"12","key":"68_CR1","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/4234.736171","volume":"2","author":"G Bianchi","year":"1998","unstructured":"Bianchi, G.: IEEE 802.11\u2014saturation throughput analysis. IEEE Commun. Lett. 2(12), 318\u2013320 (1998)","journal-title":"IEEE Commun. Lett."},{"key":"68_CR2","unstructured":"Bianchi, G., Di Stefano, A., Giaconia, C., Scalia, L., Terrazzino, G., Tinnirello, I.: Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards. In: IEEE Xplore, 29 May 2000"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Han, C., Dianati, M., Tafazolli, R., Kernchen, R.: Throughput analysis of the IEEE 802.11p enhanced distributed channel access function in vehicular environment. In: IEEE Xplore, 04 October 2010","DOI":"10.1109\/VETECF.2010.5594411"},{"key":"68_CR4","first-page":"169","volume":"3","author":"RK Challa","year":"2009","unstructured":"Challa, R.K., Chakrabarti, S., Datta, D.: An improved analytical model for IEEE 802.11 distributed coordination function under finite load. Int. J. Commun. Netw. Syst. Sci. 3, 169\u2013247 (2009)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"issue":"3","key":"68_CR5","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.2013.6549288","volume":"20","author":"D Camps-Mur","year":"2013","unstructured":"Camps-Mur, D., Garcia-Saavedra, A., Serrano, P.: Device to device communications with WiFi Direct: overview and experimentation. IEEE Wirel. Commun. 20(3), 96\u2013104 (2013)","journal-title":"IEEE Wirel. Commun."},{"key":"68_CR6","unstructured":"Rajesh, G., Srikanth, K.: WiFi Traffic Analysis Project Report. http:\/\/www3.cs.stonybrook.edu\/~rgolani\/docs\/Wireless_Report.pdf . Accessed 12 Mar 2015"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Phillips, C., Singh, S.: Analysis of WLAN Traffic in the wild. In: International Conference on Research in Networking, NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, pp. 1173\u20131178 (2007)","DOI":"10.1007\/978-3-540-72606-7_107"},{"issue":"9","key":"68_CR8","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1109\/TMC.2010.88","volume":"9","author":"R Raghavendra","year":"2010","unstructured":"Raghavendra, R., Belding, E.M., Papagiannaki, K., Almeroth, K.C.: Unwanted link layer traffic in large IEEE 802.11 wireless networks. IEEE Trans. Mob. Comput. 9(9), 1212\u20131225 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"68_CR9","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11276-004-4750-0","volume":"11","author":"D Kotz","year":"2005","unstructured":"Kotz, D., Essien, K.: Analysis of a campus-wide wireless network. Wirel. Netw. 11(1), 115\u2013133 (2005)","journal-title":"Wirel. Netw."},{"key":"68_CR10","doi-asserted-by":"crossref","unstructured":"Partridge, C., Cousins, D., Jackson, A.W., Krishnan, R., Saxena, T., Timothy Strayer, W.: Using signal processing to analyze wireless data traffic. In: WiSE 2002 \u2013 Proceedings of 1st ACM Workshop on Wireless Security Atlanta, GA, USA, pp. 67\u201376, 28\u201328 September 2002","DOI":"10.1145\/570681.570689"},{"key":"68_CR11","unstructured":"Lee, J., Choi, S., Jung, H.: Analysis of user behavior and traffic pattern in a large-scale 802.11a\/b network. https:\/\/www.researchgate.net\/publication\/228627517_Analysis_of_user_behavior_and_traffic_pattern_in_a_large-scale_80211_ab_network"},{"key":"68_CR12","first-page":"1783","volume":"25","author":"D Yamkhin","year":"2009","unstructured":"Yamkhin, D., Won, Y.: Modeling and analysis of wireless LAN traffic. J. Inf. Sci. Eng. 25, 1783\u20131801 (2009)","journal-title":"J. Inf. Sci. Eng."},{"issue":"1","key":"68_CR13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.14257\/ijfgcn.2016.9.1.07","volume":"9","author":"PA Ochang","year":"2016","unstructured":"Ochang, P.A., Irving, P.: Performance analysis of wireless network throughput and security protocol integration. Int. J. Future Gener. Commun. Netw. 9(1), 71\u201378 (2016)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"68_CR14","unstructured":"Yeo, J., Youssef, M., Agrawala, A.: Characterizing the IEEE 802.11 traffic: the wireless side. CS-TR-4570 and UMIA CS-TR-2004\u201315, University of Maryland, 1 March 2004"},{"key":"68_CR15","unstructured":"Viecco, C.H., Gupta, M.: A dense wireless LAN case study. Technical report TR640, Indiana University, December 2006"},{"key":"68_CR16","unstructured":"Jiang, M.Z.: Analysis of wireless data network traffic. Thesis submitted in partial fulfillment of the requirements for the degree of master of applied science, Simon Fraser University, April 2000"},{"key":"68_CR17","unstructured":"Cisco Systems: Cisco Wireless LAN Controller Configuration Best Practices. Cisco Press (2015)"},{"key":"68_CR18","unstructured":"Ruckus Wireless: Deploying Very High Density Wi-Fi. Best Practice Design Guide (2012)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:23:47Z","timestamp":1570083827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}