Research Article

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Figure 9

Network topology of the experiments.