Research Article
A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users
Figure 15
Probability of detection () vs. probability of false alarm () results of the voting HDF schemes with the normal SUs and MUs.