Fig. 14From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisDistance ratio of two cluster centroids in each data-rate group for selected walking pathsBack to article page