Fig. 8From: Risk management-based security evaluation model for telemedicine systemsExamples of RV estimatesBack to article page