Skip to main content
. 2020 Aug 5;115(3):2627–2643. doi: 10.1007/s11277-020-07700-9

Fig. 2.

Fig. 2

Anti Spoofing Methods