Fig. 2
From: Risk management-based security evaluation model for telemedicine systems

Seven areas related to telemedicine security threats
From: Risk management-based security evaluation model for telemedicine systems
Seven areas related to telemedicine security threats