عرض بسيط للتسجيلة

المؤلفvan der Schaaf, Koen
المؤلفTekinerdogan, Bedir
المؤلفCatal, Cagatay
تاريخ الإتاحة2022-11-30T11:23:21Z
تاريخ النشر2021
اسم المنشورConcurrency and Computation: Practice and Experience
المصدرScopus
المصدر2-s2.0-85107878531
معرّف المصادر الموحدhttp://dx.doi.org/10.1002/cpe.6385
معرّف المصادر الموحدhttp://hdl.handle.net/10576/36807
الملخصCybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards. 2021 The Authors. Concurrency and Computation: Practice and Experience published by John Wiley & Sons Ltd.
راعي المشروعOpen Access funding provided by the Qatar National Library.
اللغةen
الناشرJohn Wiley and Sons Ltd
الموضوعcybersecurity; feature model; Internet of Things; natural language processing; standards; text mining
العنوانA feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
النوعArticle
رقم العدد21
رقم المجلد33
dc.accessType Open Access


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة