Skip to main content
. 2016 Nov 18;16(11):1932. doi: 10.3390/s16111932

Figure 7.

Figure 7

Simulation with Fake Packet Injection attackers.