Fig. 3From: The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping reviewPublications concentrated on the cybersecurity of specific medical specialtiesBack to article page