Skip to main content
. 2020 Nov 2;174:102886. doi: 10.1016/j.jnca.2020.102886

Fig. 13.

Fig. 13

IoMT security methods and the security requirements.