Show simple item record

Authorvan der Schaaf, Koen
AuthorTekinerdogan, Bedir
AuthorCatal, Cagatay
Available date2022-11-30T11:23:21Z
Publication Date2021
Publication NameConcurrency and Computation: Practice and Experience
ResourceScopus
Resource2-s2.0-85107878531
URIhttp://dx.doi.org/10.1002/cpe.6385
URIhttp://hdl.handle.net/10576/36807
AbstractCybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards. 2021 The Authors. Concurrency and Computation: Practice and Experience published by John Wiley & Sons Ltd.
SponsorOpen Access funding provided by the Qatar National Library.
Languageen
PublisherJohn Wiley and Sons Ltd
Subjectcybersecurity; feature model; Internet of Things; natural language processing; standards; text mining
TitleA feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
TypeArticle
Issue Number21
Volume Number33
dc.accessType Open Access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record