Fig. 2
From: Cybersecurity profiles based on human-centric IoT devices

Example of cybercriminal profile. Example of parameters that can be used to describe a cybercriminal profile. The parameters are classified as virtual, real and hybrid data
From: Cybersecurity profiles based on human-centric IoT devices
Example of cybercriminal profile. Example of parameters that can be used to describe a cybercriminal profile. The parameters are classified as virtual, real and hybrid data