Research Article

A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

Figure 3

Box-whisker plot.