Figure4
![Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures](https://image.oaes.cc/59ba5a0f-0a2b-44b2-8bf5-2e3c16e34765/5317-4.jpg)
Figure 4. Breakdown of IoT software attacks. Data taken from the Unit 42 2020 IoT threat report[1].
Figure 4. Breakdown of IoT software attacks. Data taken from the Unit 42 2020 IoT threat report[1].
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/