Fig. 10From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge networkThe average response time of threat detection deployed on a dedicated server (a) and an AP frontend (b)Back to article page