Fig. 2
From: Simulating the overload of medical processes due to system failures during a cyberattack

Screenshot of the implemented tool with the results after simulating the ETR process showing the detailed patient information after 146 minutes
From: Simulating the overload of medical processes due to system failures during a cyberattack
Screenshot of the implemented tool with the results after simulating the ETR process showing the detailed patient information after 146 minutes