Fig. 8
From: Enhancing security in electromagnetic radiation therapy using fuzzy graph theory

Distribution of security incidents by attack type.
From: Enhancing security in electromagnetic radiation therapy using fuzzy graph theory

Distribution of security incidents by attack type.