Skip to main content
. 2016 Nov 4;16(11):1855. doi: 10.3390/s16111855

Table 3.

Results: Second test.

Targets Vulnerabilities/Instances
High Medium Low
Operating System 1/1 3/3 2/2
Components 12/18 5/8 4/7
Application 10/13 4/4 5/8