{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:36:19Z","timestamp":1752550579343},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/ccnc.2015.7157981","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T17:51:14Z","timestamp":1437069074000},"page":"225-232","source":"Crossref","is-referenced-by-count":15,"title":["Hacker's toolbox: Detecting software-based 802.11 evil twin access points"],"prefix":"10.1109","author":[{"given":"Fabian","family":"Lanze","sequence":"first","affiliation":[]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Ponce-Alcaide","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6240312"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1145\/2590296.2590333","article-title":"Letting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature","author":"lanze","year":"2014","journal-title":"Proceedings of the 9th ACM Symposium on Information Computer and Communications Security (AsiaCCS 2014)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2642687.2642691"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.178"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1592979"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/DSN.2010.5544302","article-title":"Who Is Peeping at Your Passwords at Starbucks?-To Catch an Evil Twin Access Point","author":"song","year":"2010","journal-title":"40th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2010)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"ref6","article-title":"802.11 Wireless Networks: The Definitive Guide","author":"gast","year":"2005","journal-title":"O'Reilly Media Inc"},{"key":"ref5","article-title":"Secure Open Wireless Access","author":"cross","year":"0","journal-title":"Black Hat USA 2011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062077"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"journal-title":"Standard 802 11-2012 IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"0","key":"ref9"},{"key":"ref20","article-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness","author":"sunshine","year":"2009","journal-title":"18th USENIX Security Symposium (SSYM '09)"}],"event":{"name":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2015,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,1,12]]}},"container-title":["2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7151874\/7157933\/07157981.pdf?arnumber=7157981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T02:41:00Z","timestamp":1652841660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7157981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2015.7157981","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}