Fig. 6
From: Cybersecurity profiles based on human-centric IoT devices

CPRM-based tool. Schema used to model the solution. In this figure a portion of the relationships defined to model the use case is shown
From: Cybersecurity profiles based on human-centric IoT devices
CPRM-based tool. Schema used to model the solution. In this figure a portion of the relationships defined to model the use case is shown