Figure 1From: Formal reconstruction of attack scenarios in mobile ad hoc and sensor networksNetwork topology variation.Back to article page