Fig. 3From: Cybersecurity profiles based on human-centric IoT devicesHFC methodology. Phases to define cybersecurity profiles based on parametersBack to article page