Figure 7From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer versus the location of the second jammer. Back to article page