Skip to main content
. 2023 Sep 26;23(19):8090. doi: 10.3390/s23198090

Figure 3.

Figure 3

Differentiation between the flow in the MITM attack vs. data in normal flow.