Fig. 6From: Robust proactive eavesdropping in UAV-enabled wireless communication networkingEavesdropping probability versus the maximum transmit power at EBack to article page