Skip to main content
. 2022 Dec 25;23(1):218. doi: 10.3390/s23010218

Figure 4.

Figure 4

The security risk taxonomy for HIoT BC-IdM systems.