Fig. 6From: Under false flag: using technical artifacts for cyber attack attributionCAM applied to the TV5Monde APT caseBack to article page