Fig. 4From: Cybersecurity profiles based on human-centric IoT devicesComponents in a cybercrime scene. This is a technical description of the components (and their relationships) to model a cybersecurity profileBack to article page