Fig. 1
From: Simulating the overload of medical processes due to system failures during a cyberattack

Subfigure (a) shows the real-world timings of a Computed Tomography Scan with every resource needed. In (b), a simplified time sequence is used
From: Simulating the overload of medical processes due to system failures during a cyberattack
Subfigure (a) shows the real-world timings of a Computed Tomography Scan with every resource needed. In (b), a simplified time sequence is used