Fig. 5
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

End-to-end delay vs. number of nodes.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
End-to-end delay vs. number of nodes.