Skip to main content
. 2020 Jun 10;20:106. doi: 10.1186/s12911-020-01145-7

Fig. 2.

Fig. 2

Seven areas related to telemedicine security threats