Fig. 2From: Cybersecurity profiles based on human-centric IoT devicesExample of cybercriminal profile. Example of parameters that can be used to describe a cybercriminal profile. The parameters are classified as virtual, real and hybrid dataBack to article page