Skip to main content
. 2021 May 19;21(10):3538. doi: 10.3390/s21103538

Figure 14.

Figure 14

Results from experiments no. 16, 17, 18, and 19 (experiments can be found in Table 3, Table 4, Table 5, Table 6 and Table 7); the graph presents the situation when there are equal numbers of regular users and attackers.