Fig. 11From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationEnergy-efficiency vs user ID: case of intensive attack due to presence of malicious users 10–18 and collapse of UAV bandwidthBack to article page