Skip to main content
. 2013 Apr 2;11:85. doi: 10.1186/1479-5876-11-85

Figure 9.

Figure 9

Security layers of the system.