Figure 5From: Bargaining-based jammer power allocation for dynamic eavesdropping scenario Achievable secrecy rates versus eavesdropping probability in a two-source network. Back to article page