Skip to main content
. 2016 Sep 2;11(9):e0162289. doi: 10.1371/journal.pone.0162289

Fig 13. The degree distribution under different fe subject to the ID attack for (a) WS network and (b) NW network.

Fig 13