Fig. 16From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systemsSummary of detection accuracy for various attack scenariosBack to article page