Skip to main content
. 2022 Mar 4;22(5):2017. doi: 10.3390/s22052017

Figure 8.

Figure 8

Nomenclature of cyber-attacks used in this review.