Fig. 15From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisDetection evaluation from various \(T_{\gamma }\) valuesBack to article page