Research Article

A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

Figure 15

Probability of detection () vs. probability of false alarm () results of the voting HDF schemes with the normal SUs and MUs.