Fig. 9From: Cybersecurity profiles based on human-centric IoT devicesImpact on target parameters. Results for BobBack to article page