Fig. 12From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisWalking-pattern examples during the test periodBack to article page