Now, let us analyze the situation where the alternative topologies switch to the attacked topology G at time t1, which is before time t. There are two possibilities at this point: <br>Now, let us analyze the situation where the backup topology switches to the attacked topology G at time t1 before time t2.
正在翻译中..