Fig. 9From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge networkThe success rate with a different number of precursor frames in scenarios A and GBack to article page