Fig. 1From: Survivable strategy set design for malicious attack propagation in NEMO scenarioIllustration of survivability (adapted from [7])Back to article page