Fig. 5From: Detecting data manipulation attacks on physiological sensor measurements in wearable medical systemsDetecting malicious alterations of ECG sensor measurementsBack to article page