{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:21:20Z","timestamp":1761675680742},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062077","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"1593-1601","source":"Crossref","is-referenced-by-count":40,"title":["A Measurement Based Rogue AP Detection Scheme"],"prefix":"10.1109","author":[{"given":"H.","family":"Han","sequence":"first","affiliation":[{"name":"State Key Lab. of Novel Software Technol., Nanjing Univ., Nanjing"}]},{"given":"B.","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"C. C.","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Q.","family":"Li","sequence":"additional","affiliation":[]},{"given":"S.","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Lab. of Novel Software Technol., Nanjing Univ., Nanjing"}]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","article-title":"robust rate adaptation for 802.11 wireless networks","author":"wong","year":"0","journal-title":"MOBICOM 2006"},{"journal-title":"MADWiFi","year":"0","key":"18"},{"year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510748"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"14","article-title":"a passive approach to rogue access point detection","author":"watkins","year":"0","journal-title":"Globecom 2007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.239"},{"key":"12","article-title":"on fast and accurate detection of unauthorized wireless access points using clock skews","author":"jana","year":"0","journal-title":"Mobicom 2008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330140"},{"journal-title":"Air wave","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"journal-title":"Air magnet","year":"0","key":"2"},{"journal-title":"Air defence","year":"0","key":"1"},{"key":"10","article-title":"a location-based management system for enterprise wireless lans","author":"chandra","year":"0","journal-title":"NSDI 2007"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455018"},{"key":"6","article-title":"detecting protected layer-3 rogue aps","author":"yin","year":"0","journal-title":"Broadnets 2007"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298357"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.178"},{"key":"9","article-title":"architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks","author":"adya","year":"0","journal-title":"Mobicom 2004"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134682"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062077.pdf?arnumber=5062077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:22:53Z","timestamp":1677781373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062077","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}