{"id":"https://openalex.org/W2105962127","doi":"https://doi.org/10.1109/pccc.2010.5682342","title":"RAPiD: An indirect rogue access points detection system","display_name":"RAPiD: An indirect rogue access points detection system","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2105962127","doi":"https://doi.org/10.1109/pccc.2010.5682342","mag":"2105962127"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2010.5682342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682342","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005828574","display_name":"Guangzhi Qu","orcid":"https://orcid.org/0000-0003-4047-9514"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Guangzhi Qu","raw_affiliation_strings":["Computer Science and Engineering Department, Oakland University, Rochester, Michigan, USA","Computer Science and Engineering Department Oakland University Rochester Michigan USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Oakland University, Rochester, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Computer Science and Engineering Department Oakland University Rochester Michigan USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040078679","display_name":"Margarat Michael","orcid":"https://orcid.org/0000-0002-2878-7701"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Nefcy Michael","raw_affiliation_strings":["Computer Science and Engineering Department, Oakland University, Rochester, Michigan, USA","Computer Science and Engineering Department Oakland University Rochester Michigan USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Oakland University, Rochester, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Computer Science and Engineering Department Oakland University Rochester Michigan USA","institution_ids":["https://openalex.org/I177721651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005828574"],"corresponding_institution_ids":["https://openalex.org/I177721651"],"apc_list":null,"apc_paid":null,"fwci":0.8137,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.73957016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"9","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8159475326538086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7517907023429871},{"id":"https://openalex.org/keywords/wireless-intrusion-prevention-system","display_name":"Wireless intrusion prevention system","score":0.6403376460075378},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.6112618446350098},{"id":"https://openalex.org/keywords/wireless-wan","display_name":"Wireless WAN","score":0.5255338549613953},{"id":"https://openalex.org/keywords/wireless-distribution-system","display_name":"Wireless distribution system","score":0.5078223347663879},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.4912659525871277},{"id":"https://openalex.org/keywords/wi-fi","display_name":"Wi-Fi","score":0.48693931102752686},{"id":"https://openalex.org/keywords/local-area-network","display_name":"Local area network","score":0.48237553238868713},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4687903821468353},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.41926059126853943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40346699953079224},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1674555540084839}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8159475326538086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517907023429871},{"id":"https://openalex.org/C121286152","wikidata":"https://www.wikidata.org/wiki/Q8026893","display_name":"Wireless intrusion prevention system","level":5,"score":0.6403376460075378},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.6112618446350098},{"id":"https://openalex.org/C87379069","wikidata":"https://www.wikidata.org/wiki/Q938054","display_name":"Wireless WAN","level":5,"score":0.5255338549613953},{"id":"https://openalex.org/C33947955","wikidata":"https://www.wikidata.org/wiki/Q1429342","display_name":"Wireless distribution system","level":5,"score":0.5078223347663879},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.4912659525871277},{"id":"https://openalex.org/C508800617","wikidata":"https://www.wikidata.org/wiki/Q29643","display_name":"Wi-Fi","level":4,"score":0.48693931102752686},{"id":"https://openalex.org/C137471899","wikidata":"https://www.wikidata.org/wiki/Q11381","display_name":"Local area network","level":2,"score":0.48237553238868713},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4687903821468353},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.41926059126853943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40346699953079224},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1674555540084839}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pccc.2010.5682342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682342","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W163099463","https://openalex.org/W1518556146","https://openalex.org/W1529710634","https://openalex.org/W1585944368","https://openalex.org/W1595569211","https://openalex.org/W1601182760","https://openalex.org/W1978193834","https://openalex.org/W1978286719","https://openalex.org/W1984872578","https://openalex.org/W2042662524","https://openalex.org/W2083648618","https://openalex.org/W2098936405","https://openalex.org/W2111654482","https://openalex.org/W2138016680","https://openalex.org/W2143575328","https://openalex.org/W2145068953","https://openalex.org/W2148326942","https://openalex.org/W2153821484","https://openalex.org/W2162470501","https://openalex.org/W6606690333","https://openalex.org/W6631788415","https://openalex.org/W6635929975","https://openalex.org/W6682490834"],"related_works":["https://openalex.org/W3206458211","https://openalex.org/W2378519673","https://openalex.org/W3005787259","https://openalex.org/W2185909443","https://openalex.org/W2292836561","https://openalex.org/W2371947886","https://openalex.org/W644011889","https://openalex.org/W2126524237","https://openalex.org/W155968509","https://openalex.org/W4256481956"],"abstract_inverted_index":{"Rogue":[0],"wireless":[1,47,67,83,120,137,151],"access":[2],"points":[3],"(RWAPs)":[4],"bypass":[5],"physical":[6],"endpoint":[7],"security":[8,16],"of":[9,32,37,54,73,140],"local":[10,59],"area":[11],"networks":[12],"and":[13,28,57,84,97,108,126],"present":[14],"significant":[15],"threats":[17],"by":[18,44,90],"creating":[19],"network":[20,33,141],"attack":[21],"vectors":[22],"behind":[23],"firewalls,":[24],"exposing":[25],"confidential":[26],"information,":[27],"allowing":[29],"unauthorized":[30,46,66],"utilization":[31],"resources.":[34],"A":[35],"family":[36],"more":[38],"promising":[39],"methods":[40],"detects":[41],"RWAPs":[42],"indirectly":[43],"identifying":[45],"hosts":[48,68,121,138],"through":[49],"using":[50],"temporal":[51,79],"TCP/IP":[52],"characteristics":[53],"SYN,":[55,124],"FIN,":[56,125],"ACK":[58,127],"round":[60],"trip":[61],"times":[62],"(LRTT).":[63],"Thus":[64],"any":[65],"found":[69],"indicate":[70],"the":[71,92],"presence":[72],"a":[74,110],"RWAP.":[75],"With":[76],"these":[77],"session-based":[78],"characteristics,":[80],"traffic":[81],"from":[82,158],"wired":[85],"nodes":[86],"can":[87,129,153],"be":[88,130,155],"differentiated":[89],"exploiting":[91],"fundamental":[93],"differences":[94],"between":[95],"Ethernet":[96,159],"802.11b/g/n.":[98],"In":[99],"this":[100],"work,":[101],"we":[102],"empirically":[103],"analyzed":[104],"extensive":[105],"LRTT":[106],"data":[107],"designed":[109],"light":[111],"system":[112],"\u2014":[113],"RAPiD":[114],"with":[115],"several":[116],"algorithms":[117],"for":[118],"effective":[119],"detection.":[122],"Ultimately,":[123],"LRTTs":[128],"compared":[131],"against":[132],"each":[133],"other":[134],"to":[135,165],"discover":[136],"regardless":[139],"speeds.":[142],"The":[143],"results":[144],"show":[145],"first":[146],"time":[147],"how":[148],"merging":[149],"802.11n":[150],"technology":[152],"still":[154],"accurately":[156],"separated":[157],"hosts,":[160],"even":[161],"as":[162],"it":[163],"continues":[164],"improve.":[166]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
