Fig. 6From: Cybersecurity profiles based on human-centric IoT devicesCPRM-based tool. Schema used to model the solution. In this figure a portion of the relationships defined to model the use case is shownBack to article page