Fig. 7From: Intrusion detection systems for wireless sensor networks using computational intelligence techniquesShows protocols vs (192.168.239.255) destination IPBack to article page