Login / Signup
Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication.
Zhiqi Tao
Anthonie B. Ruighaver
Published in:
AISM (2005)
Keyphrases
</>
access points
wireless local area network
wireless networks
wireless lan
wireless networking
mobile devices
mobile users
wifi
line segments
wireless communication
multi hop
mobile nodes
mobile networks
data sets
computer networks
ad hoc networks