Login / Signup
A solution to detect the existence of a malicious rogue AP.
Fu-Hau Hsu
Yu-Liang Hsu
Chuan-Sheng Wang
Published in:
Comput. Commun. (2019)
Keyphrases
</>
detection algorithm
computer vision
closed form
automatic detection
complementarity problems
database
clustering algorithm
mathematical model
solution quality