Fig. 8From: Survivable strategy set design for malicious attack propagation in NEMO scenarioSurvivability impact of different schemes (a–d) in DRSBack to article page