20.500.12592/c9dkjb
Table 2 on page 28
Found in: CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review
For copyright status please check original publication.