Critical Nodes - Watson Project

[...] Fig. 1 shows fraud vulnerability frequencies among three key elements.