Skip to main content
. 2024 Nov 26;24(23):7534. doi: 10.3390/s24237534

Figure 1.

Figure 1

The system model associated with loop-based attack.