Figure 8
From: Intrusion tolerant QoS provision in mobile multihop relay networks

Processing delay according to malicious nodes number.
From: Intrusion tolerant QoS provision in mobile multihop relay networks
Processing delay according to malicious nodes number.