Figure 8
From: Intrusion tolerant QoS provision in mobile multihop relay networks
![Figure 8](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2F1687-1499-2013-100/MediaObjects/13638_2012_Article_695_Fig8_HTML.jpg)
Processing delay according to malicious nodes number.
From: Intrusion tolerant QoS provision in mobile multihop relay networks
Processing delay according to malicious nodes number.