Figure 9From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer Utility versus the location of the second jammer. Back to article page