Fig. 13From: Tracking intruder ship in wireless environmentTarget detection reliability in % across number of tampered nodesBack to article page