Cascading attack on trusted-relay quantum key distribution networks
Jian Wang,Xing-tong Liu
Figure 3. Influence of γ on $E(P({e}_{{ij}}))$ in the simulation of a cascading attack on a QKD network.