Figure 7From: Exploiting and defending trust models in cooperative spectrum sensing Modeling the trust damage from Figure 6 . Back to article page