Fig. 10From: Enhanced security using multiple paths routine scheme in cloud-MANETsAverage end-to-end delay vs number of attackersBack to article page