Skip to main content
. 2022 Jul 30;22(15):5726. doi: 10.3390/s22155726

Table 3.

Threat complexity matrix.

Tc Access-Complexity
Levels
Attacker-Capability
Levels
Multi-Level Single-Level Direct
High M L L
Medium H M L
Low H H M