Fig. 2From: The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping reviewYearly distribution of publicationsBack to article page