Fig. 7From: Risk management-based security evaluation model for telemedicine systemsExample of a user or patient attack treeBack to article page