Fig. 2From: Under false flag: using technical artifacts for cyber attack attributionThe Cyber Attribution Model applied to detect inconsistencies in the attribution processBack to article page