Journals
Publish with us
Publishing partnerships
About us
Blog
Scientific Programming
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Scientific Programming
/
2019
/
Article
/
Fig 2
/
Research Article
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets
Figure 2
BPF rule definition process. (a) Select TCP payload octets. (b) Establish values for octets.
(a)
(b)