Figure 2From: Formal reconstruction of attack scenarios in mobile ad hoc and sensor networksGenerated attack scenarios.Back to article page