Fig. 8From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysisEffect of RCPI on RTTBack to article page