Fig. 15
From: Enhancing security in electromagnetic radiation therapy using fuzzy graph theory

Attack pattern recognition example.
From: Enhancing security in electromagnetic radiation therapy using fuzzy graph theory

Attack pattern recognition example.