• 1
    He V, Mitchell JC. Security analysis and improvements for IEEE 802.11 i. The 12th Network and Distributed System Security Symposium, San Diego, Feb. 2005; 90110.
  • 2
    Henry P, Luo H. WiFi: what's next? IEEE Communications Magazine 2002; 40:6672.
  • 3
    Bahl P, Chandra R, Padhye J, et al. Enhancing the security of corporate Wi-Fi networks using DAIR. MobiSys 2006:114.
  • 4
    IEEE 802.11 user fingerprinting and its applications for intrusion detection.
  • 5
  • 6
    NetStumbler. Available from:
  • 7
    RogueScanner. Available from:
  • 8
    Schweitzer D, Brown W, Boleng J. Using visualization to locate rogue access points. Journal of Computing Sciences in Colleges 2007; 23:134140.
  • 9
    Solution to the Wireless Evil-Twin Transmitter Attack.
  • 10
    A Location-aware Rogue AP Detection System Based on Wireless Packet Sniffing of Sensor APs.
  • 11
    Bahl P, Padmanabhan VN. RADAR: an in-building RF-based user location and tracking system. The 19th Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, March 2000; 775784.
  • 12
    Beyah R, Kangude S, Yu G, Strickland B, Copeland J. Rogue access point detection using temporal traffic characteristics. GLOBECOM 2004; 4:22712275.
  • 13
    Wei W, Suh K, Wang B, Gu Y, Kurose J, Towsley D. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-Pairs. The Seventh ACM Internet Measurement Conference, San Diego, Oct. 2007; 365378.
  • 14
    Watkins L, Beyah R, Corbeet C. A passive approach to rogue access point detection. IEEE GLOBECOM 2007:355360.
  • 15
    Han H, Sheng B, Tan CC, Li Q, Lu S. A measurement based rogue AP detection scheme. Infocom 2009; 15931601.
  • 16
    Lacage M, Manshaei MH, Turletti T. IEEE 802.11 rate adaptation: a practical approach. The 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct. 2004; 126134.
  • 17
    Holma H, Toskala A. 3GPP release 5 HSDPA measurements. 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sept. 2006; 15.
  • 18
    Holma H, Toskala A. LTE for UMTS : OFDMA and SC-FDMA Based Radio Access. Wiley, 2009; 244245.
  • 19
    Hodge V, Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review 2004; 22:85126.
  • 20
    MacQueen JB. Some methods for classification and analysis of multivariate observations. In Proceedings of 5-th Berkeley Symposium on Mathematical Statistics and Probability. University of California Press: Berkeley, 1967; 281297.
  • 21
    Sumathi S, Esakkirajan S. Fundamentals of Relational Database Management Systems. Berlin Heidelberg: Springer, February 2007; 439.