[1] |
WANG C , TAI T . Achieving time-based fairness for VoIP applications in IEEE 802.11 WLAN using a cross-layer approach[C]// IEEE International Symposium on Personal Indoor and Mobile Radio Communications. 2010: 1475-1480.
|
[2] |
SANDEEP B V . Rogue access point detection using multi parameter dynamic feature analysis for wireless LAN[D]. Bharati Vidyapeeth University, 2016.
|
[3] |
HAN H , SHENG B , TAN C ,et al. A timing-based scheme for rogue AP detection[J]. IEEE Transactions on Parallel & Distributed Systems, 2011,22(11): 1912-1925.
|
[4] |
ALOTAIBI B , ELLEITHY K . An empirical fingerprint framework to detect rogue access points[C]// Systems,Applications and Technology Conference. 2015: 1-7.
|
[5] |
KIM I , SEO J , SHON T ,et al. A novel approach to detection of mobile rogue access points[J]. Security & Communication Networks, 2015,7(10): 1510-1516.
|
[6] |
DAHIYA M , GILL S . Detection of rogue access point in WLAN using hopfield neural network[J]. International Journal of Electrical& Computer Engineering, 2017,7(2): 1060-1070.
|
[7] |
JADHAV S , VANJALE S B , MANE P B . Illegal access point detection using clock skews method in wireless LAN[C]// The International Conference on Computing for Sustainable Global Development. 2014: 724-729.
|
[8] |
ZHENG X , WANG C , CHEN Y ,et al. Accurate rogue access point localization leveraging fine-grained channel information[C]// Communications and Network Security. 2014: 211-219.
|
[9] |
KIM T , PARK H , JUNG H ,et al. Online detection of fake access points using received signal strengths[C]// Vehicular Technology Conference. 2012: 1-5.
|
[10] |
李晴, 叶阿勇, 许力 . 公众环境下无线接入的安全问题研究[J]. 信息网络安全, 2016(4): 69-75.
|
|
LI Q , YE A , XU L . Research on security issues of wireless access in public environment[J]. Netinfo Security, 2016(4): 69-75.
|
[11] |
CHENG N , WANG X , CHENG W ,et al. Characterizing privacy leakage of public WiFi networks for users on travel[C]// IEEE INFOCOM. 2013: 2769-2777.
|