Skip to main content
. 2020 Nov 2;174:102886. doi: 10.1016/j.jnca.2020.102886

Fig. 12.

Fig. 12

IoMT Security methods percentage.