Skip to main content
. 2022 Nov 2;82(11):16951–16971. doi: 10.1007/s11042-022-14036-y

Fig. 7.

Fig. 7

Environments used by a threat agent to exploit the network