{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:23Z","timestamp":1738777223618,"version":"3.37.0"},"reference-count":13,"publisher":"Academy Publisher","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.12.3470-3477","type":"journal-article","created":{"date-parts":[[2014,12,27]],"date-time":"2014-12-27T03:04:58Z","timestamp":1419649498000},"source":"Crossref","is-referenced-by-count":0,"title":["Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering"],"prefix":"10.4304","volume":"9","author":[{"given":"Nazrul","family":"M. Ahmad","sequence":"first","affiliation":[]},{"given":"Anang","family":"Hudaya Muhamad Amin","sequence":"additional","affiliation":[]},{"given":"Subarmaniam","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"Mohd","family":"Faizal Abdollah","sequence":"additional","affiliation":[]},{"given":"Robiah","family":"Yusof","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,12,26]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.002"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/DSN.2010.5544302","article-title":"Who is Peeping at your Passwords at Starbucks? \u2014 To Catch an Evil Twin Access Point","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Song","year":"2010","unstructured":"[2] Y. Song, C. Yang, and G. Gu, \"Who is Peeping at your Passwords at Starbucks? \u2014 To Catch an Evil Twin Access Point,\" IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 2010, pp. 323-332,"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"key":"ref4","first-page":"193","article-title":"\"Detecting and Localizing Wireless Spoofing Attacks,\" Conference of the 4th Annual IEEE","author":"Chen","year":"2007","unstructured":"[4] Y. Chen, W. Trappe, and R. P. Martin, \"Detecting and Localizing Wireless Spoofing Attacks,\" Conference of the 4th Annual IEEE Communications Society, 2007, pp. 193-202","journal-title":"Commun Soc","ISSN":"https:\/\/id.crossref.org\/issn\/0010-3497","issn-type":"print"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref6","first-page":"309","article-title":"Sequence Number-based MAC Address Spoof Detection","volume-title":"Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection","author":"Guo","year":"2005","unstructured":"[7] F. Guo, and T. Chiueh, \"Sequence Number-based MAC Address Spoof Detection,\" In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, 2005, pp. 309-329"},{"key":"ref7","article-title":"SoftMAC: Flexible Wireless Research Platform","volume-title":"Proc of the 4th Workshop on Hot Topics in Networks","author":"Neufeld","year":"2005","unstructured":"[8] M. Neufeld, J. Fifield, C. Doerr, A. Sheth, and D. Grunwld, \"SoftMAC: Flexible Wireless Research Platform,\" Proc. of the 4th Workshop on Hot Topics in Networks, 2005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJCCBS.2012.053204"},{"key":"ref9","first-page":"1","article-title":"\"Detecting Spoofing Attacks in Mobile Wireless Environments,\" Conference of the 6th Annual IEEE","author":"Yang","year":"2009","unstructured":"[12] J. Yang, Y. Chen, and W. Trappe, \"Detecting Spoofing Attacks in Mobile Wireless Environments,\" Conference of the 6th Annual IEEE Communications Society, 2009, pp. 1-9","journal-title":"Commun Soc","ISSN":"https:\/\/id.crossref.org\/issn\/0010-3497","issn-type":"print"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1577222.1577252","article-title":"RAP: Protecting Commodity Wi-Fi Networks from Rogue Access Points","volume-title":"Proceedings of the 4th International Conference on Quality of Service in Heterogeneous Wired\/Wireless Networks","author":"Ma","year":"2007","unstructured":"[13] L. Ma, A. Y. Teymorian, X. Cheng, and M. Song, \"RAP: Protecting Commodity Wi-Fi Networks from Rogue Access Points,\" In QShine '07: Proceedings of the 4th International Conference on Quality of Service in Heterogeneous Wired\/Wireless Networks, 2007"},{"key":"ref11","first-page":"281","article-title":"Some Methods for Classification and Analysis of Multivariate Observations","volume-title":"Proc of 5th Berkeley Symposium on Mathematical Statistics and Probability","author":"MacQueen","year":"1967","unstructured":"[17] J. B. MacQueen, \"Some Methods for Classification and Analysis of Multivariate Observations,\" Proc. of 5th Berkeley Symposium on Mathematical Statistics and Probability, 1967, pp. 281-297"},{"key":"ref12","volume-title":"Unsupervised Classification","author":"Bandyopadhyay","year":"2012","unstructured":"[18] S. Bandyopadhyay, and S. Saha, Unsupervised Classification: Similarity Measures, Classical and Metaheuristic Approaches, and Applications, Springer, 2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:57Z","timestamp":1738775337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,26]]},"references-count":13,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2014,12,26]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.12.3470-3477","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,12,26]]}}}