Skip to main content
. 2020 Jun 10;20:106. doi: 10.1186/s12911-020-01145-7

Fig. 7.

Fig. 7

Example of a user or patient attack tree