Fig. 10From: Survivable strategy set design for malicious attack propagation in NEMO scenarioSurvivability impact of two strategiesBack to article page