Skip to main content
. 2024 Jun 8;24(12):3735. doi: 10.3390/s24123735

Figure 5.

Figure 5

Memory usage trend: (a) during attack; (b) during legitimate user interaction.