Fig. 6From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systemsAn example of portraitBack to article page