Research Article

A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets

Figure 3

Analysis of the impact of BPF rules in throughput.