Skip to main content
. 2024 Jan 15;10:e1772. doi: 10.7717/peerj-cs.1772

Figure 3. Overview of some of the countermeasures effective against cyberterrorism.

Figure 3