Research Article

An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks

Figure 5

Plot of requite trust with respect to time for genuine and selfish SU.