Fig. 9From: Survivable strategy set design for malicious attack propagation in NEMO scenarioSurvivability impact of different schemes (a–d) in IRSBack to article page