Skip to main content
. 2019 Mar 8;19(5):1184. doi: 10.3390/s19051184

Figure 10.

Figure 10

Decoded information received from the malicious application.