Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP
Vol. 40, No. 3, pp. 551-558, Mar. 2015
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
R. Jang, J. Kang, D. Nyang, K. Lee, "Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 551-558, 2015. DOI: .
[ACM Style]
Rhong-Ho Jang, Jeon-Il Kang, Dae-Hun Nyang, and Kyung-Hee Lee. 2015. Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP. The Journal of Korean Institute of Communications and Information Sciences, 40, 3, (2015), 551-558. DOI: .
[KICS Style]
Rhong-Ho Jang, Jeon-Il Kang, Dae-Hun Nyang, Kyung-Hee Lee, "Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 551-558, 3. 2015.