{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:10:42Z","timestamp":1769724642139,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662478530","type":"print"},{"value":"9783662478547","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47854-7_22","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T10:06:28Z","timestamp":1436954788000},"page":"370-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points"],"prefix":"10.1007","author":[{"given":"Christian","family":"Szongott","sequence":"first","affiliation":[]},{"given":"Michael","family":"Brenner","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Bauer, K., Gonzales, H., McCoy, D.: Mitigating evil twin attacks in 802.11. In: 2008 IEEE International Performance, Computing and Communications Conference, pp. 513\u2013516, December 2008","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Muders, T., Baumg\u00e4rtner, L., Freisleben, B., Smith, M.: Why eve and mallory love android: an analysis of android SSL (in)security. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 50\u201361. ACM (2012)","DOI":"10.1145\/2382196.2382205"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Perl, H., Koetter, M., Smith, M.: Rethinking SSL development in an appified world. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 49\u201360. ACM (2013)","DOI":"10.1145\/2508859.2516655"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D., Sicker, D.: Practical defenses for evil twin attacks in 802.11. In: 2010 IEEE Global Telecommunications Conference, pp. 1\u20136, December 2010","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Kindberg, T., Mitchell, J., Grimmett, J., Bevan, C., O\u2019Neill, E.: Authenticating public wireless networks with physical evidence. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2009, pp. 394\u2013399, October 2009","DOI":"10.1109\/WiMob.2009.73"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Lanze, F., Panchenko, A., Braatz, B., Engel, T.: Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 3\u201314. ACM (2014)","DOI":"10.1145\/2590296.2590333"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-642-23822-2_2","volume-title":"Computer Security \u2013 ESORICS 2011","author":"D M\u00f3nica","year":"2011","unstructured":"M\u00f3nica, D., Ribeiro, C.: WiFiHop - mitigating the evil twin attack through multi-hop detection. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 21\u201339. Springer, Heidelberg (2011)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Roth, V., Polak, W., Rieffel, E., Turner, T.: Simple and effective defense against evil twin access points. In: Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, p. 220, March 2008","DOI":"10.1145\/1352533.1352569"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Song, Y., Yang, C., Gu, G.: Who is peeping at your passwords at starbucks? - to catch an evil twin access point. In: DSN 2010, pp. 323\u2013332 (2010)","DOI":"10.1109\/DSN.2010.5544302"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Szongott, C., Henne, B., Smith, M.: Evaluating the threat of epidemic mobile malware. In: WiMob, pp. 443\u2013450. IEEE Computer Society (2012)","DOI":"10.1109\/WiMOB.2012.6379111"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-642-35404-5_11","volume-title":"Cryptology and Network Security","author":"C Szongott","year":"2012","unstructured":"Szongott, C., Henne, B., Smith, M.: Mobile evil twin malnets \u2013 the worst of both worlds. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 126\u2013141. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47854-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T13:05:25Z","timestamp":1676466325000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47854-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662478530","9783662478547"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47854-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}