Fig. 2From: Exploiting prospect theory and risk-awareness to protect UAV-assisted network operationProspect-theoretic utilityBack to article page