Fig. 2From: Survivable strategy set design for malicious attack propagation in NEMO scenarioState transition diagram of one nodeBack to article page