{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:12:12Z","timestamp":1758845532560,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323700","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T21:11:35Z","timestamp":1523481095000},"page":"211-216","source":"Crossref","is-referenced-by-count":2,"title":["User-side evil twin attack detection using time-delay statistics of TCP connection termination"],"prefix":"10.23919","author":[{"given":"En-Chun","family":"Kuo","sequence":"first","affiliation":[]},{"given":"Ming-Sang","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Da-Yu","family":"Kao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"Applying TCP Profiling to Detect Wireless Rogue Access Point","author":"yu","year":"2014","journal-title":"Proceedings of the 2014 World Congress in Computer Science Computer Engineering and Applied Computing"},{"key":"ref3","first-page":"117","article-title":"Kali Linux Wireless Penetration Testing: Beginner's Guide","author":"ramachandran","year":"2015","journal-title":"Packt Publishing Ltd"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998425"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/DSN.2010.5544302","article-title":"Who Is Peeping at Your Passwords at Starbucks?-To Catch an Evil Twin Access Point","author":"song","year":"2010","journal-title":"2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367750"},{"key":"ref8","first-page":"145","author":"sak","year":"2016","journal-title":"Mastering Kali Linux Wireless Pentesting"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157983"},{"key":"ref2","first-page":"774","article-title":"Detection & Analysis of Evil Twin Attack in Wireless Network","volume":"8","author":"modi","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/MILCOM.2016.7795501","article-title":"User-side Wi-Fi Evil Twin Attack Detection Using Random Wireless Channel Monitoring","author":"nakhila","year":"2016","journal-title":"2016 IEEE Military Communications Conference (MILCOM)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119419303"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323700.pdf?arnumber=8323700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:59:21Z","timestamp":1598230761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323700","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}