Research Article

A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

Figure 10

No MUs with 40 normal SUs in the network.