Locating and eliminating rogue software-reconfigurable terminals from networks | IET Conference Publication | IEEE Xplore