Research Article

A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks

Figure 3

Flow chart of the proposed scheme.