Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 2

Network architecture and profiling.