Figure 4From: PUE attack detection in CWSNs using anomaly detection techniquesCluster layout for different initial radius. Distribution of the data in a specific clustering algorithm scenario, depending on the initial radius.Back to article page