Figure 3From: Detection of jamming attacks in 802.11b wireless networks Detection of reactive jamming attack. Back to article page