Table 8 Resilience against cyber threats summary Cyber threats Summary.

From: Intelligent two-phase dual authentication framework for Internet of Medical Things

Cyber threat type

Simulated incidents

Successfully thwarted incidents

Success rate (%)

Man-in-the-Middle

100

100

100

Replay attacks

100

100

100

Brute-force attacks

100

99

99