Fig. 5From: Cybersecurity profiles based on human-centric IoT devicesProfiles matching. Steps for the completeness of HF-based cybersecurity profilesBack to article page