Research Article

Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks

Figure 5

The process of getting the dropped packets set.