Research Article
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
Figure 10
The RSS data distribution at 10 locations from four monitoring sensors. (a) 1st sensor. (b) 2nd sensor. (c) 3rd sensor. (d) 4th sensor.
(a) |
(b) |
(c) |
(d) |