{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T21:10:20Z","timestamp":1684617020992},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T00:00:00Z","timestamp":1225497600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s11036-008-0109-6","type":"journal-article","created":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T02:29:19Z","timestamp":1225420159000},"page":"508-522","source":"Crossref","is-referenced-by-count":5,"title":["Robust Detection of Unauthorized Wireless Access Points"],"prefix":"10.1007","volume":"14","author":[{"given":"Bo","family":"Yan","sequence":"first","affiliation":[]},{"given":"Guanling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongda","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,1]]},"reference":[{"key":"109_CR1","doi-asserted-by":"crossref","unstructured":"Bahl P, Chandra R, Padhye J, Ravindranath L, Singh M, Wolman A, Zill B (2006) Enhancing the security of corporate Wi-Fi networks using DAIR. In: Proceedings of the fourth international conference on mobile systems, applications, and services, Uppsala, June 2006","DOI":"10.1145\/1134680.1134682"},{"key":"109_CR2","doi-asserted-by":"crossref","unstructured":"Bahl P, Padmanabhan VN (2000) RADAR: an in-building RF-based user location and tracking system. In: Proceedings of the 19th annual joint conference of the IEEE computer and communications societies, Tel Aviv, March 2000","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"109_CR3","unstructured":"Bellardo J, Savage S (2003) 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th USENIX security symposium, Washington, DC, August 2003, pp 15\u201328"},{"key":"109_CR4","doi-asserted-by":"crossref","unstructured":"Bittau A, Handley M, Lackey J (2006) The final nail in WEP\u2019s coffin. In: Proceedings of the 2006 IEEE symposium on security and privacy, Oakland, May 2006","DOI":"10.1109\/SP.2006.40"},{"key":"109_CR5","unstructured":"Bulk F (2006) Safe inside a bubble. June. www.networkcomputing.com"},{"key":"109_CR6","doi-asserted-by":"crossref","unstructured":"Deshpande U, Henderson T, Kotz D (2006) Channel sampling strategies for monitoring wireless networks. In: Proceedings of the second workshop on wireless network measurements, Boston, April 2006","DOI":"10.1109\/WIOPT.2006.1666486"},{"key":"109_CR7","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, Nashville"},{"key":"109_CR8","unstructured":"Garg S, Kappes M, Krishnakumar AS (2002) On the effect of contention-window sizes in IEEE 802.11 b networks. Technical report ALR-2002-024, Avaya Labs Research"},{"key":"109_CR9","unstructured":"He C, Mitchell JC (2005) Security analysis and improvements for IEEE 802.11 i. In: Proceedings of the 12th network and distributed system security symposium, San Diego, February 2005"},{"key":"109_CR10","volume-title":"Approximation algorithms for NP-hard problems","author":"D Hochbaum","year":"1997","unstructured":"Hochbaum D (1997) Approximating covering and packing problems: set cover, vertex cover, independent set, and related problems. In: Hochbaum D (ed) Approximation algorithms for NP-hard problems. PWS, Boston"},{"key":"109_CR11","doi-asserted-by":"crossref","unstructured":"Jung J, Paxson V, Berger AW, Balakrishnan H (2004) Fast portscan detection using sequential hypothesis testing. In: Proceedings of the 2004 IEEE symposium on security and privacy, Berkeley, May 2004, pp 211\u2013225","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"109_CR12","unstructured":"MAP (2006) Security through measurement for wireless LANs. Dartmouth College, July. http:\/\/www.cs.dartmouth.edu\/~map\/"},{"key":"109_CR13","unstructured":"Pang R, Tierney B (2005) A Ffrst look at modern enterprise traffic. In: Proceedings of the fifth ACM internet measurement conference, Berkeley, October 2005, pp 15\u201328"},{"key":"109_CR14","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux J-P, Aad I (2004) DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of the second international conference on mobile systems, applications, and services, Boston, June 2004, pp 84\u201397","DOI":"10.1145\/990064.990077"},{"key":"109_CR15","doi-asserted-by":"crossref","unstructured":"Rodrig M, Reis C, Mahajan R, Wetherall D, Zahorjan J (2005) Measurement-based characterization of 802.11 in a hotspot setting. In: Proceeding of the ACM SIGCOMM workshop on experimental approaches to wireless network design and analysis, Philadelphia, August 2005, pp 5\u201310","DOI":"10.1145\/1080148.1080150"},{"key":"109_CR16","doi-asserted-by":"crossref","unstructured":"Sheng Y, Chen G, Tan K, Deshpande U, Vance B, Yin H, Henderson T, Kotz D, Campbell A, Wright J (2008) MAP: a scalable monitoring system for dependable 802.11 wireless networks. IEEE Wirel Commun, October 2008, pp 10\u201318","DOI":"10.1109\/MWC.2008.4653127"},{"key":"109_CR17","unstructured":"Mobile Antivirus Researcher\u2019s Association (2006) The ten most critical wireless and mobile security vulnerabilities. Mobile Antivirus Researcher\u2019s Association, June"},{"key":"109_CR18","volume-title":"Sequential analysis","author":"A Wald","year":"1947","unstructured":"Wald A (1947) Sequential analysis. Wiley, New York"},{"key":"109_CR19","doi-asserted-by":"crossref","unstructured":"Wang X, Reeves DS (2003) Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of the 10th ACM conference on computer and communications security, Washington, DC, October 2003, pp 20\u201329","DOI":"10.1145\/948109.948115"},{"key":"109_CR20","unstructured":"Wei W, Jaiswal S, Kurose J, Towsley D (2006) Identifying 802.11 traffic from passive measurements using iterative bayesian inference. In: Proceedings of the 25th annual joint conference of the IEEE computer and communications societies, Barcelona, April 2006"},{"key":"109_CR21","doi-asserted-by":"crossref","unstructured":"Wei W, Suh K, Wang B, Gu Y, Kurose J, Towsley D (2007) Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-Pairs. In: Proceedings of the seventh ACM internet measurement conference, San Diego, October 2007","DOI":"10.1145\/1298306.1298357"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0109-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-008-0109-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-008-0109-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T20:56:27Z","timestamp":1684616187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-008-0109-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["109"],"URL":"https:\/\/doi.org\/10.1007\/s11036-008-0109-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,1]]}}}