Fig. 13From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationDetecting malicious user behavior: Prospect-theoretic parameters vs user IDBack to article page