Fig. 6From: A survey on cognitive radio network attack mitigation using machine learning and blockchainReceiver operating characteristic curve. Receiver operating characteristic curves of decision tree, K-means, logistic regression and binary clustering are shownBack to article page