Fig. 12From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationDetecting malicious user behavior: Transmission power vs user IDBack to article page