Fig. 3From: Revisiting the power of reinsertion for optimal targets of network attackVisualization of one instance for each type of random networksBack to article page