Figure 5From: PUE attack detection in CWSNs using anomaly detection techniquesFalse positives using data clustering. Results of the simulations with the clustering algorithm and 50 nodes in the network.Back to article page