Fig. 6From: Joint resource optimization for secure transmission in cooperative CR networksTransmission rate of secondary system and eavesdropper wiretapped versus d 2 with different location of eavesdropperBack to article page