Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 10

The RSS data distribution at 10 locations from four monitoring sensors. (a) 1st sensor. (b) 2nd sensor. (c) 3rd sensor. (d) 4th sensor.
(a)
(b)
(c)
(d)