Figure 6From: Bargaining-based jammer power allocation for dynamic eavesdropping scenario Sum-secrecy-rates versus eavesdropping probability in a two-source network. Back to article page