Fig. 14From: Enhanced security using multiple paths routine scheme in cloud-MANETsThroughput vs number of attacker nodesBack to article page