Skip to main content
. 2020 Jun 10;20:106. doi: 10.1186/s12911-020-01145-7

Fig. 5.

Fig. 5

Attack tree