Fig. 14From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationPower investment vs user ID implementing intrusion detection and ejectionBack to article page