Research Article
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
Figure 11
The probability histogram of RSS at 10 locations from four monitoring sensors. (a) 1st sensor. (b) 2nd sensor. (c) 3rd sensor. (d) 4th sensor.
(a) |
(b) |
(c) |
(d) |