Using Hidden Markov Model to detect rogue access points.
Gayathri ShivarajMin SongSachin ShettyPublished in: Secur. Commun. Networks (2010)
Keyphrases
- hidden markov models
- access points
- wireless networks
- speech recognition
- markov model
- sequential data
- handwritten word recognition
- real time
- markov models
- mobile users
- conditional random fields
- gesture recognition
- mobile devices
- viterbi algorithm
- hidden state
- discriminative training
- continuous hidden markov models
- neural network
- wifi
- probabilistic model
- hierarchical hidden markov model