Research Article

Evaluating Grayware Characteristics and Risks

Figure 9

Plane map for token steal on Information Exposure.
569829.fig.009