Skip to main content

Table 2 Running-time analysis

From: Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis

Method

Running time

Yang et al. [29]

\({\mathcal {O}}(n^2 \log n)\)

Kitisriworapan et al. [24]

\({\mathcal {O}}(n^2 \log n)\)

Han et al. [27, 28]

\({\mathcal {O}}(n^2)\)

Ours

\({\mathcal {O}}(n\log n)\)