{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:32Z","timestamp":1730211692623,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108956","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T21:03:11Z","timestamp":1591390991000},"page":"150-157","source":"Crossref","is-referenced-by-count":0,"title":["A Precise Method for Monitoring and Detecting Recurrent Attacks on Wireless Networks based on Link-Layer Traffic Classification"],"prefix":"10.1109","author":[{"given":"Andreane Spano","family":"da Roza","sequence":"first","affiliation":[]},{"given":"Joao","family":"Vitor Valle","sequence":"additional","affiliation":[]},{"given":"Diogo Menezes","family":"Ferrazani Mattos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"User-side wi-fi evil twin attack detection using ssl\/tcp protocols","author":"omar nakhila","year":"2015","journal-title":"CCNC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2017.7965725"},{"key":"ref14","article-title":"Detection of de-authentication dos attacks in wi-fi networks: A machine learning approach","author":"mayank agarwal","year":"2015","journal-title":"IEEE International Workshop on Information Forensics and Security (WIFS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1300-5"},{"key":"ref16","article-title":"Detection & analysis of evil twin attack in wireless network","volume":"8","author":"modi","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-0663-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref4","article-title":"Machine learning-based jamming detection forieee 802.11: Design and experimental evaluation","author":"pu\u00f1al","year":"2014","journal-title":"IEEE International Symposium on A World of Wireless Mobile and Multimedia Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-014-0309-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2018.8312268"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/532434"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CIACT.2017.7977375"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8241999"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2019,10,23]]},"location":"Quito, Ecuador","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108956.pdf?arnumber=9108956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:19:03Z","timestamp":1657855143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108956","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}