Login / Signup

A solution to detect the existence of a malicious rogue AP.

Fu-Hau HsuYu-Liang HsuChuan-Sheng Wang
Published in: Comput. Commun. (2019)
Keyphrases
  • detection algorithm
  • computer vision
  • closed form
  • automatic detection
  • complementarity problems
  • database
  • clustering algorithm
  • mathematical model
  • solution quality