[1]
S. Meenakshi, J. Thomas, K. S. Balaji, S. N. Narayanan, S. Raman, and V. Kamakoti, “Detecting Unauthorized Access Points in Wireless Environment”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 246–250, Nov. 2025.