Fig. 10From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationUser data rate vs user ID: case of presence of malicious users 11–13Back to article page