Fig. 4From: Survivable strategy set design for malicious attack propagation in NEMO scenarioThe timing diagram for IRSBack to article page