Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 4

Flow of spoofing attack detection.