Fig. 2From: On the security of cooperative cognitive radio networks with distributed beamformingCooperative cognitive radio network with K eavesdroppersBack to article page