Research Article

A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks

Figure 5

Performance comparison of various schemes with and without “Random” attack.