Figure 10From: Security management based on trust determination in cognitive radio networks The successful transmission rate of different cognitive users. Back to article page