Fig. 3From: Under false flag: using technical artifacts for cyber attack attributionA simplified linear view on the attribution processBack to article page