Figure 7
From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

versus the location of the second jammer.
From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer
versus the location of the second jammer.