Fig. 1From: Revisiting the power of reinsertion for optimal targets of network attackIllustration of the reinsertion power on Gnutella31 networkBack to article page