Research Article

An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks

Figure 4

Plot of variation of past event trust for genuine SU and selfish SU and MU with time.