Skip to main content
. 2022 Jul 8;102:108212. doi: 10.1016/j.compeleceng.2022.108212

Fig. 6.

Fig. 6

An example of fileless attack.