Figure 6From: PUE attack detection in CWSNs using anomaly detection techniquesFalse positives using data clustering and ten PUE attackers. Multiple attack against the clustering algorithm.Back to article page