Skip to main content
. 2020 Jun 30;8:124134–124144. doi: 10.1109/ACCESS.2020.3006172

FIGURE 5.

FIGURE 5.

Potential solutions to mitigate cyberattacks during pandemics.