Skip to main content
. 2020 Nov 2;174:102886. doi: 10.1016/j.jnca.2020.102886

Table 5.

IoMT most common cyber attacks.