Fig. 13From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisScattering RTT values of walking pattern w1Back to article page