Login / Signup

Using Hidden Markov Model to detect rogue access points.

Gayathri ShivarajMin SongSachin Shetty
Published in: Secur. Commun. Networks (2010)
Keyphrases