Figure 13From: Detection and analysis of the Chameleon WiFi access point virus Post-attack distribution of beacon intervals. Back to article page