Fig. 5
From: Cybersecurity profiles based on human-centric IoT devices

Profiles matching. Steps for the completeness of HF-based cybersecurity profiles
From: Cybersecurity profiles based on human-centric IoT devices
Profiles matching. Steps for the completeness of HF-based cybersecurity profiles