Skip to main content
. 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116

Figure 16.

Figure 16

The result of calculating the entropy for CPU load by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) by the impact of a deauthentication attack.