Skip to main content
. 2010 Apr 30;10(5):4456–4496. doi: 10.3390/s100504456

Figure 1.

Figure 1.

Generalized model of the intelligent sensor used for security analyses during the IT security development process [3].