Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 8

Experimental setting.