Fig. 8From: Enhanced security using multiple paths routine scheme in cloud-MANETsPDR vs number of attackersBack to article page