Fig. 6From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisRTT analysis for various traffic loadsBack to article page