2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2018
DOI: 10.1109/w-ficloud.2018.00024
|View full text |Cite
|
Sign up to set email alerts
|

User Trajectory Extraction Based on WiFi Scanning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The programming language used for the scripts operating basically in Linux based operating systems is python version 3. The operation of the first modified script implementing a linear algorithm for discovering wireless networks involves the following basic steps [2,3,4,5,6,7,8,9,10,16,14,19]:…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The programming language used for the scripts operating basically in Linux based operating systems is python version 3. The operation of the first modified script implementing a linear algorithm for discovering wireless networks involves the following basic steps [2,3,4,5,6,7,8,9,10,16,14,19]:…”
Section: Methodsmentioning
confidence: 99%
“…In the first mode of operation, it is typical for hosts to connect to each other. And in the second mode, the hosts connect to a central running device such as access point [2,3,4,5,6,7,9,14,15,18,19]. In practice, several basic modes are used to scan wireless networks.…”
Section: Introductionmentioning
confidence: 99%
“…With mobile phones becoming proxies for human presence, network resources have been exploited to investigate users' mobility [1]. Spatio-temporal mobility datasets are nowadays acknowledged as a common tool to study users' trajectories: e.g., mobile phone records [2], WiFi [3], [4], and BLE data [5]. Most require access to users' devices, network infrastructure, or volunteer recruiting, while some lack scalability.…”
Section: Introductionmentioning
confidence: 99%
“…MAC randomization affects the continuation and validity of important works in domains relying on device-based identifiers, such as user trajectory inference [6], [7] and crowd flow estimation [8], from public packets. Recent literature heavily investigates the MAC address association, i.e.…”
Section: Introductionmentioning
confidence: 99%