Skip to main content
. 2021 Sep 11;75:103311. doi: 10.1016/j.scs.2021.103311

Fig. 3.

Fig. 3

Different layer security threats to HC-IoT applications.