Fig. 10From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systemsProcess for selecting parameters: window size w, training time Δ, and number of PCs kBack to article page