Skip to main content
. 2013 Apr;14(2):91–110. doi: 10.2174/1389202911314020003

Fig. (3).

Fig. (3)

Flowchart of the method used by Garcia et al. [77].

HHS Vulnerability Disclosure