Skip to main content
. 2019 Sep 17;19(18):4007. doi: 10.3390/s19184007

Figure 10.

Figure 10

Changing the pattern of traffic for the network under the Black-Hole attack with a change in the number of malicious nodes: (a) for three malicious hosts; (b) for nine malicious hosts; (c) when malicious nodes were missing.