Skip to main content
. 2024 Jan 15;10:e1772. doi: 10.7717/peerj-cs.1772

Figure 1. Various methods through which cyberterrorism is carried out.

Figure 1