Fig. 1From: Proactive eavesdropping in UAV-aided mobile relay systemsSystem model of proactive eavesdropping in a UAV-aided suspicious relay systemBack to article page