Skip to main content
. 2006 Nov 21;8(4):e28. doi: 10.2196/jmir.8.4.e28

Figure 3.

Figure 3

A sample identification database (shown shaded) for data intrusion simulation