Research Article

A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

Figure 11

Five LMUs and one OMU with 34 normal SUs in the network.