Figure 9
From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

Utility versus the location of the second jammer.
From: Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer
Utility versus the location of the second jammer.