{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:15:44Z","timestamp":1725484544573},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754971","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000348-000353","source":"Crossref","is-referenced-by-count":3,"title":["Abrupt ending of 802.11 AP connections"],"prefix":"10.1109","author":[{"given":"Dossa","family":"Massa","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Toward a more practical unsupervised anomaly detection system","author":"song","year":"2011","journal-title":"Inform Sci"},{"key":"16","article-title":"Anomaly detection in campus WiFi zones","author":"baras","year":"2010","journal-title":"IEEE Per Commun"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4599219"},{"key":"14","article-title":"A novel method for supervised anomaly detection by cascading K means clustering and T03 decision tree learning methods","author":"gaddam","year":"2007","journal-title":"IEEE Trans TKDE"},{"key":"11","article-title":"A clustering approach to wireless network intrusion detection","author":"zhong","year":"2005","journal-title":"IEEE ICT A"},{"key":"12","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","author":"leung","year":"2005","journal-title":"CRPIT"},{"key":"3","article-title":"Scalable and robust WLAN connectivity using access point array","author":"guo","year":"2005","journal-title":"IEEE DSN"},{"year":"0","key":"2"},{"key":"1","article-title":"Architecture and techniques for diagnosing faults in","author":"adya","year":"2004","journal-title":"IEEE 802 11 Infrastructure Networks ACM MobiCom"},{"journal-title":"The Shaman Automatic 802 11 Wireless Diagnosis System","year":"2010","author":"cheng","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592695"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/SURV.2010.021110.00020","article-title":"A taxonomy of IEEE 802. i I wireless parameters an d open source measurement tools","author":"dujovne","year":"2010","journal-title":"IEEE Communications Survey"},{"key":"9","article-title":"Online passive interference estimation for enterprise WLANs","author":"shrivastava","year":"2010","journal-title":"IWCMC"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282384"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754971.pdf?arnumber=6754971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:18Z","timestamp":1498108518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754971","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}