Skip to main content
. 2019 Sep 17;19(18):4007. doi: 10.3390/s19184007

Figure 12.

Figure 12

The CPU consumption of the nodes under the deauthentication attack.