{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:24:13Z","timestamp":1729632253825,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682342","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:08:43Z","timestamp":1294409323000},"page":"9-16","source":"Crossref","is-referenced-by-count":5,"title":["RAPiD: An indirect rogue access points detection system"],"prefix":"10.1109","author":[{"given":"Guangzhi","family":"Qu","sequence":"first","affiliation":[]},{"given":"M. Nefcy","family":"Michael","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.005"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-540-24668-8_16","article-title":"A Robust Classifier for Passive TCP\/IP Fingerprinting","author":"beverly","year":"2004","journal-title":"Passive and Active Network Measurement"},{"journal-title":"POF An advanced passive OS\/network fingerprinting utility for use in IDS environments","year":"2009","key":"ref31"},{"journal-title":"MadWiFi An advanced Linux kernel device driver for Atheros-based Wireless LAN devices","year":"2009","key":"ref30"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOM.2007.73","article-title":"A Passive Approach to Rogue Access Point Detection","volume":"7","author":"watkins","year":"2007","journal-title":"Global Telecommunications Conference 2007 GLOBECOM '07"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753358"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330334"},{"journal-title":"Proxim Rogue Access Point Detection Automatically Detect and Manage Wireless Threats to Your Network","year":"2004","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210186"},{"journal-title":"Aircrack-ng WEP and WPA\/WPA2-PSK cracker and analysis tool for 802 11 wireless LANs","year":"2009","key":"ref12"},{"key":"ref13","article-title":"Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks","author":"adya","year":"2004","journal-title":"Proceedings of the 10th Annual International Conference on Mobile Computing and Networking"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1145\/1134680.1134682","article-title":"Enhancing the security of corporate Wi-Fi networks using DAIR","author":"bahl","year":"2006","journal-title":"Proceedings of the 4th International Conference on Mobile Systems Applications and Services"},{"key":"ref15","article-title":"Rogue Access Point Based DoS Attacks against 802.11 WLANs","author":"chibiao","year":"2008","journal-title":"Telecommunications 2008 AICT '08 Fourth Advanced International Conference on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2007.4550468"},{"key":"ref17","article-title":"Passive Listening and Intrusion Management in Commodity Wi-Fi Networks","volume":"7","author":"liran","year":"2007","journal-title":"Global Telecommunications Conference 2007 GLOBECOM '07"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204225"},{"journal-title":"NetStumbler Detect Wireless Local Area Networks using 802 11b 802 11a and 802 11g","year":"2004","author":"milner","key":"ref19"},{"key":"ref28","first-page":"795","article-title":"Detecting and Blocking Unauthorized Access in Wi-Fi Networks","author":"xia","year":"2004","journal-title":"Networking"},{"journal-title":"Wi-Fi CERTIFIED&#x2122; for wi-Fi Protected Setup&#x2122; Easing the User Experience for Home and Small Office Wi-Fi&#x00AE; Networks","year":"0","author":"alliance","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011329512150"},{"journal-title":"802 11n The Next Generation of Wireless Performance","year":"2009","key":"ref3"},{"journal-title":"How to spoof a MAC address","year":"2009","author":"perrin","key":"ref6"},{"journal-title":"IP Personality Linux 2 4 kernel patch adding the ability to have different &#x2018;personalities&#x2019; network wise","year":"2009","key":"ref29"},{"journal-title":"MAC Spoofing An Introduction","year":"2003","author":"cardenas","key":"ref5"},{"journal-title":"AirMagnet 24\/7 WLAN Security and Performance Monitoring","year":"2009","key":"ref8"},{"journal-title":"Kismet An 802 11 layer2 wireless network detector sniffer and intrusion detection system","year":"2009","key":"ref7"},{"journal-title":"Key Performance Benefits of 802 11 n","year":"0","key":"ref2"},{"journal-title":"Motorola AirDefense A 24&#x00D7;7 wireless intrusion prevention system","year":"2009","key":"ref9"},{"article-title":"First Look: Cisco's 1250 802.11n AP","year":"2008","author":"blandford","key":"ref1"},{"key":"ref20","first-page":"134","article-title":"Using visualization to locate rogue access points","volume":"23","author":"schweitzer","year":"2007","journal-title":"J Comput Small Coll"},{"journal-title":"Bradford Networks Comprehensive Network Access Control","year":"2009","key":"ref22"},{"journal-title":"NMap (Network Mapper) Free Security Scanner For Network Exploration & Hacking","year":"2009","key":"ref21"},{"key":"ref24","article-title":"Using nessus to detect wireless acccess points","author":"gula","year":"0","journal-title":"Tenable Network Security 2003"},{"key":"ref23","article-title":"Detecting Rogue Access Point (RAP) using Simple Network Management Protocol (SNMP)","author":"ahmad","year":"2008","journal-title":"International Conference on Network Applicaitons Protocols and Services 2008 (NetApps2008)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751456"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682342.pdf?arnumber=5682342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T02:24:58Z","timestamp":1637115898000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682342","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}