{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:04:31Z","timestamp":1773655471213,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.3103\/s0146411617080302","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T06:51:40Z","timestamp":1519887100000},"page":"978-984","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Protection of Wi-Fi network users against rogue access points"],"prefix":"10.3103","volume":"51","author":[{"given":"D. P.","family":"Zegzhda","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. D.","family":"Dakhnovich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"6642_CR1","unstructured":"Software CommView for Wi-Fi, 2015. http:\/\/www.tamos.ru\/products\/commview\/."},{"key":"6642_CR2","unstructured":"Software Aircrack-ng, 2015. http:\/\/www.aircrack-ng.org\/."},{"key":"6642_CR3","unstructured":"Authentication Types for Wireless Devices, 2008. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/routers\/access\/wireless\/software\/guide\/SecurityAuthenticationTypes.html#wp1034623."},{"key":"6642_CR4","unstructured":"802.1X: Port-based network access control, 2010. http:\/\/standards.ieee.org\/getieee802\/download\/802.1X-2010.pdf."},{"key":"6642_CR5","unstructured":"Cisco Rogue Management, 2013. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/technology\/roguedetection_ deploy\/Rogue_Detection.html."},{"key":"6642_CR6","unstructured":"Software Waidps. https:\/\/github.com\/SYWorks\/waidps.git."},{"key":"6642_CR7","unstructured":"Software EvilAP_Defender. https:\/\/github.com\/moha99sa\/EvilAP_Defender\/wiki."},{"key":"6642_CR8","unstructured":"Software HTTPS Everywhere. http:\/\/www.eff.org\/https-everywhere."},{"key":"6642_CR9","unstructured":"Public key cryptography, 2011. http:\/\/www.intuit.ru\/studies\/courses\/28\/28\/lecture\/20422."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617080302","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080302.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080302.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:57:36Z","timestamp":1773611856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617080302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["6642"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617080302","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"15 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}