{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:59Z","timestamp":1740122699829,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:00:00Z","timestamp":1522972800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"FCT","award":["SFRH\/BD\/99714\/2014","UID\/EEA\/50014\/2013"],"award-info":[{"award-number":["SFRH\/BD\/99714\/2014","UID\/EEA\/50014\/2013"]}]},{"DOI":"10.13039\/501100008530","name":"ERDF","doi-asserted-by":"crossref","award":["POCI-01-0145-FEDER-006961"],"award-info":[{"award-number":["POCI-01-0145-FEDER-006961"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10922-018-9455-2","type":"journal-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T20:42:59Z","timestamp":1523047379000},"page":"3-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Anomaly Detection and Modeling in 802.11 Wireless Networks"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0834-4049","authenticated-orcid":false,"given":"Anisa","family":"Allahdadi","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"key":"9455_CR1","doi-asserted-by":"publisher","unstructured":"Nicholson, A.J., Chawathe, Y., Chen, M.Y., Noble, B.D., Wetherall, D.: Improved access point selection. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, pp. 233\u2013245. MobiSys \u201906. ACM, Uppsala (2006). ISBN: 159593-195-3. https:\/\/doi.org\/10.1145\/1134680.1134705","DOI":"10.1145\/1134680.1134705"},{"key":"9455_CR2","doi-asserted-by":"publisher","unstructured":"Heusse, M., Rousseau, F., Berger-Sabbatel, G., Duda, A.: Performance anomaly of 802.11b. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol. 2, pp. 836\u2013843. IEEE Societies (2003). https:\/\/doi.org\/10.1109\/INFCOM.2003.1208921","DOI":"10.1109\/INFCOM.2003.1208921"},{"key":"9455_CR3","doi-asserted-by":"publisher","unstructured":"Dujovne, D., Turletti, T., Filali, F.: A taxonomy of IEEE 802.11 wireless parameters and open source measurement tools. In: Communications Surveys Tutorials, IEEE 12.2, pp. 249\u2013262 (2010). ISSN: 1553-877X. https:\/\/doi.org\/10.1109\/SURV.2010.021110.00020","DOI":"10.1109\/SURV.2010.021110.00020"},{"key":"9455_CR4","doi-asserted-by":"publisher","unstructured":"Adya, A., Bahl, P., Chandra, R., Qiu, L.: Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 30\u201344. MobiCom \u201904. ACM, Philadelphia, PA (2004). ISBN: 1-58113-868-7. https:\/\/doi.org\/10.1145\/1023720.1023724","DOI":"10.1145\/1023720.1023724"},{"key":"9455_CR5","doi-asserted-by":"publisher","unstructured":"Cheng, Y.-C., Bellardo, J., Benko\u00f6, P., Snoeren, A.C., Voelker, G.M., Savage, S.: Jigsaw: solving the puzzle of enterprise 802.11 analysis. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 39\u201350. SIGCOMM \u201906. ACM, Pisa (2006). ISBN: 1-59593-308-5. https:\/\/doi.org\/10.1145\/1159913.1159920","DOI":"10.1145\/1159913.1159920"},{"key":"9455_CR6","doi-asserted-by":"publisher","unstructured":"Paul, U., Kashyap, A., Maheshwari, R., Das, S.R.: Passive measurement of interference in WiFi networks with application in misbehavior detection. In: IEEE Transactions on Mobile Computing, vol. 12, no. 3, pp. 434\u2013446 (2013). ISSN: 1536-1233. https:\/\/doi.org\/10.1109\/TMC.2011.259","DOI":"10.1109\/TMC.2011.259"},{"key":"9455_CR7","doi-asserted-by":"crossref","unstructured":"Allahdadi, A., Morla, R., Aguiar, A., Cardoso, J.S.: Predicting short 802.11 sessions from RADIUS usage data. In: 2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/LCNW.2013.6758491"},{"key":"9455_CR8","doi-asserted-by":"crossref","unstructured":"Allahdadi, A., Morla, R., Cardoso, J.S.: Outlier detection in 802.11 wireless access points using Hidden Markov Models. In: 2014 7th IFIP on Wireless and Mobile Networking Conference (WMNC), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/WMNC.2014.6878860"},{"key":"9455_CR9","first-page":"25","volume":"11","author":"V Shrivastava","year":"2011","unstructured":"Shrivastava, V., Rayanchu, S.K., Banerjee, S., Papagiannaki, K.: PIE in the sky: online passive interference estimation for enterprise WLANs. NSDI 11, 25\u201325 (2011)","journal-title":"NSDI"},{"key":"9455_CR10","doi-asserted-by":"crossref","unstructured":"Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, pp. 191\u2013204. ACM (2006)","DOI":"10.1145\/1134680.1134701"},{"key":"9455_CR11","doi-asserted-by":"crossref","unstructured":"Lakshminarayanan, K., Seshan, S., Steenkiste, P.: Understanding 802.11 performance in heterogeneous environments. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Home Networks, pp. 43\u201348. ACM (2011)","DOI":"10.1145\/2018567.2018577"},{"key":"9455_CR12","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Analyzing the MAC-level behavior of wireless networks in the wild. In: ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 75\u201386. ACM (2006)","DOI":"10.1145\/1159913.1159923"},{"issue":"5","key":"9455_CR13","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s11276-012-0514-4","volume":"19","author":"D Massa","year":"2013","unstructured":"Massa, D., Morla, R.: Modeling 802.11 AP usage through daily keep-alive event counts. Wirel. Netw. 19(5), 1005\u20131022 (2013)","journal-title":"Wirel. Netw."},{"key":"9455_CR14","doi-asserted-by":"crossref","unstructured":"Massa, D., Morla, R.: Abrupt ending of 802.11 ap connections. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp. 000348\u2013000353. IEEE (2013)","DOI":"10.1109\/ISCC.2013.6754971"},{"key":"9455_CR15","doi-asserted-by":"crossref","unstructured":"Khayam, S.A., Radha, H.: Markovbased modeling of wireless local area networks. In: Proceedings of the 6th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 100\u2013107. ACM (2003)","DOI":"10.1145\/940991.941009"},{"key":"9455_CR16","doi-asserted-by":"crossref","unstructured":"Kamthe, A., Carreira-Perpin\u00e1n, M.A., Cerpa, A.E.: M&M: multi-level Markov model for wireless link simulations. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, pp. 57\u201370. ACM (2009)","DOI":"10.1145\/1644038.1644045"},{"key":"9455_CR17","unstructured":"Bednarczyk, W., Gajewski, P.: Hidden Markov models based channel status prediction for cognitive radio networks. In: Session 4P6 RF and Wireless Communication, p. 2088 (2015)"},{"key":"9455_CR18","unstructured":"Akbar, I., Tranter, W.H., et al.: Dynamic spectrum allocation in cognitive radio using hidden Markov models: Poisson distributed case. In: IEEE on SoutheastCon, 2007. Proceedings, pp. 196\u2013201. IEEE (2007)"},{"key":"9455_CR19","doi-asserted-by":"crossref","unstructured":"Ghosh, C., Cordeiro, C., Agrawal, D.P., Bhaskara, M.B.: Markov chain existence and hidden Markov models in spectrum sensing. In: IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/PERCOM.2009.4912868"},{"issue":"10","key":"9455_CR20","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1002\/wcm.1017","volume":"12","author":"VK Tumuluru","year":"2012","unstructured":"Tumuluru, V.K., Wang, P., Niyato, D.: Channel status prediction for cognitive radio networks. Wirel. Commun. Mob. Comput. 12(10), 862\u2013874 (2012)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"9455_CR21","doi-asserted-by":"crossref","unstructured":"Prasad, P.S., Agrawal, P.: Movement prediction in wireless networks using mobility traces. In: 2010 7th IEEE on Consumer Communications and Networking Conference (CCNC), pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/CCNC.2010.5421613"},{"key":"9455_CR22","unstructured":"The Internet Engineering Task Force (IETF). https:\/\/www.ietf.org\/ . Accessed in Jan 2016"},{"key":"9455_CR23","unstructured":"RFC 2865 radius authentication. http:\/\/tools.ietf.org\/html\/rfc2865 . Accessed in Jan 2016"},{"key":"9455_CR24","unstructured":"RFC 2866 radius authentication. http:\/\/tools.ietf.org\/html\/rfc2866 . Accessed in Jan 2016"},{"key":"9455_CR25","doi-asserted-by":"crossref","unstructured":"Reynolds, D.: Gaussian mixture models. In: Encyclopedia of Biometrics, pp. 827\u2013832. Springer (2015)","DOI":"10.1007\/978-1-4899-7488-4_196"},{"issue":"1","key":"9455_CR26","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L Rabiner","year":"1986","unstructured":"Rabiner, L., Juang, B.-H.: An introduction to hidden Markov models. IEEE ASSP Mag. 3(1), 4\u201316 (1986)","journal-title":"IEEE ASSP Mag."},{"issue":"458","key":"9455_CR27","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1198\/016214502760047131","volume":"97","author":"C Fraley","year":"2002","unstructured":"Fraley, C., Raftery, A.E.: Model-based clustering, discriminant analysis, and density estimation. J. Am. Stat. Assoc. 97(458), 611\u2013631 (2002)","journal-title":"J. Am. Stat. Assoc."},{"key":"9455_CR28","unstructured":"Fraley, C., Raftery, A.E., Murphy, T.B., Scrucca, L.: mclust version 5.1 for R: normal mixture modeling for model-based clustering, classification, and density estimation, vol. 597. Technical report (2015)"},{"key":"9455_CR29","unstructured":"Schliep, A., Costa, I.G., Georgi, B., Hafemeister, C., Schonhuth, A., Mahmud, M.P.: GHMM Library. http:\/\/ghmm.org . Accessed in Mar 2016"},{"key":"9455_CR30","unstructured":"The FreeRADIUS Project. http:\/\/freeradius.org\/ . Accessed in Feb 2016"},{"key":"9455_CR31","unstructured":"Wifijammer. https:\/\/github.com\/DanMcInerney\/wifijammer . Accessed in Feb 2016"},{"key":"9455_CR32","unstructured":"System Sciences at Isis. http:\/\/systems-sciences.uni-graz.at\/etextbook\/bigdata\/confusionmatrix.html . Accessed in April 2016"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9455-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9455-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9455-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T07:14:18Z","timestamp":1604128458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9455-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,6]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["9455"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9455-2","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2018,4,6]]},"assertion":[{"value":"9 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}