20.500.12592/gzmf17
Table 1 on page 28
Found in: CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review
For copyright status please check original publication.