Figure 5.

Defense process by the SCP-M/SCP-O models.

Malekzadeh et al. EURASIP Journal on Information Security 2011 2011:4   doi:10.1186/1687-417X-2011-4
Download authors' original image