Fig. 5From: Intrusion detection systems for wireless sensor networks using computational intelligence techniquesShows protocols vs (ff02::1:3) destination IPBack to article page