Author of the publication

An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval.

, , , and . SERE (Companion), page 1-2. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PORE: a personal ontology recommender system for digital libraries., , , , and . Electron. Libr., 27 (3): 496-508 (2009)A Personal Ontology Model for Library Recommendation System., , , and . ICADL, volume 4312 of Lecture Notes in Computer Science, page 173-182. Springer, (2006)An index selection method without repeated optimizer estimations., and . Inf. Sci., 179 (13): 2263-2272 (2009)An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval., , , and . SERE (Companion), page 1-2. IEEE, (2014)Detecting rogue access points using client-side bottleneck bandwidth analysis., , and . Comput. Secur., 28 (3-4): 144-152 (2009)A SysML-Based Requirement Supporting Tool for Embedded Software., , , , , , , and . SSIRI (Companion), page 202-206. IEEE Computer Society, (2011)A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs., , , and . SAC, page 32-36. ACM, (2011)WLAN Location-Aware Application Based on Accumulated Orientation Strength Algorithm., , and . EuroSSC, volume 4272 of Lecture Notes in Computer Science, page 204-217. Springer, (2006)Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information., and . Inf. Sci., 178 (4): 1049-1068 (2008)