Figure 3From: Security management based on trust determination in cognitive radio networks The graph of trust interaction. Back to article page