Fig. 5From: Survivable strategy set design for malicious attack propagation in NEMO scenarioAttack scenario in the NEMO scenarioBack to article page