Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 12

The ROC curve of different attack locations.