Return to Article Details Discovering Minimum Exposed Path to Attack in Mobile Ad hoc Networks in optimal O(|P|) time after pre-processingLatex and Image File Download Download PDF