相似文献/References:
[1]刘晓明 谢李蓉 邓锋.IEEE802.11MAC协议DCF接收模块的软件实现[J].计算机技术与发展,2008,(11):172.
LIU Xiao-ming,XIE Li-rong,DENG Feng.Implementation of Reception Module by Software via DCF in IEEE802.11 MAC Protocol[J].,2008,(07):172.
[2]朱会东 黄艳 黄永丽.无线局域网中的入侵检测研究与设计[J].计算机技术与发展,2007,(06):173.
ZHU Hui-dong,HUANG Yan,HUANG Yong-li.Research and Design of Intrusion Detection in WLAN[J].,2007,(07):173.
[3]梁文波 董平 张宏科.基于CAPWAP的集中配置管理机制的研究与实现[J].计算机技术与发展,2012,(11):69.
LIANG Wen-bo,DONG Ping,ZHANG Hong-ke.Research and Implementation of Centralized Management and Configuration Based on CAPWAP[J].,2012,(07):69.
[4]程金晶[][],魏东岩[],唐阳阳[]. WLAN指纹定位中AP选择策略研究[J].计算机技术与发展,2015,25(03):1.
CHENG Jin-jing[][],WEI Dong-yan[],TANG Yang-yang[]. Research on AP Selection Strategy Based on WLAN Fingerprint Positioning[J].,2015,25(07):1.