Skip to main content
. 2023 Jun 30;23(13):6067. doi: 10.3390/s23136067

Figure 13.

Figure 13

Verification of malicious SSID visibility.