Fig. 10
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

Comparative performance of intrusion detection methods.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Comparative performance of intrusion detection methods.