Fig. 3From: Survivable strategy set design for malicious attack propagation in NEMO scenarioThe timing diagram for DRSBack to article page