Skip to main content
. 2011 Oct 17;2011:817951. doi: 10.1155/2011/817951

Figure 2.

Figure 2

Proposed algorithm for the management of hardware-related infection.