{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:21:17Z","timestamp":1743114077178,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":4,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_144","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"910-914","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP"],"prefix":"10.1007","author":[{"given":"Doyeon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Dongkyoo","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Dongil","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"3","key":"144_CR1","first-page":"551","volume":"40","author":"R-H Jang","year":"2015","unstructured":"Jang, R.-H., et al.: Analysis of time-based unauthorized AP detection methods according to hardware performance of unauthorized AP. J. Korean Inst. Commun. Inf. Sci. 40(3), 551\u2013558 (2015)","journal-title":"J. Korean Inst. Commun. Inf. Sci."},{"issue":"11","key":"144_CR2","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1109\/TPDS.2011.125","volume":"22","author":"H Han","year":"2011","unstructured":"Han, H., et al.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912\u20131925 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"144_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.13089\/JKIISC.2014.24.1.87","volume":"24","author":"J Lee","year":"2014","unstructured":"Lee, J., Lee, S., Moon, J.: Detecting rogue AP using k-SVM method. J. Korea Inst. Inf. Secur. Cryptol. 24(1), 87\u201395 (2014)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"issue":"3","key":"144_CR4","doi-asserted-by":"publisher","first-page":"431","DOI":"10.13089\/JKIISC.2013.23.3.431","volume":"23","author":"S Kang","year":"2013","unstructured":"Kang, S., Nyang, D., Choi, J., Lee, S.: Relaying rogue AP detection scheme using SVM. J. Korea Inst. Inf. Secur. Cryptol. (JKIISC) 23(3), 431\u2013444 (2013)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol. (JKIISC)"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T13:02:30Z","timestamp":1533387750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_144","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}