Fig. 2From: Revisiting the power of reinsertion for optimal targets of network attackIllustration of the reinsertion procedureBack to article page