Skip to main content
. 2024 Jun 28;10:e2130. doi: 10.7717/peerj-cs.2130

Figure 2. CONNECT attack architecture diagram.

Figure 2

Image credit: Cyber Security Laboratory at SRM Institute of Science and Technology.