Fig. 13From: Enhanced security using multiple paths routine scheme in cloud-MANETsAverage end-to-end delay vs number of attacker nodesBack to article page