Fig. 6From: Intrusion detection systems for wireless sensor networks using computational intelligence techniquesShows protocols vs (192.168.239.1) Source IPBack to article page