Skip to main content
. 2021 May 19;21(10):3538. doi: 10.3390/s21103538

Figure 12.

Figure 12

Results from experiments no. 8, 9, 10, and 11 (experiments can be found in Table 3, Table 4, Table 5, Table 6 and Table 7); according to Figure 11 the same number of users were involved—100; the number of attackers varied from 20 up to 100.