Research Article

A Dynamic Programming Model for Internal Attack Detection in Wireless Sensor Networks

Figure 8

The proportion of compromised sensors.