Figure 3From: Bargaining-based jammer power allocation for dynamic eavesdropping scenario Sum-secrecy-rate versus eavesdropping probability in a three-source network. Back to article page