Fig. 7From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge networkThe joint impact of k and the sampling rate fs in scenarios A and G. a FPE in A, b FNE in A, c FPE in G, d FNE in GBack to article page