Fig. 5From: Risk management-based security evaluation model for telemedicine systemsAttack treeBack to article page