Figure 8From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer Power versus the location of the second jammer. Back to article page