Andrade, Roberto; Ortiz-Garcés, Iván; Tintin, Xavier; … - In: Risks : open access journal 10 (2022) 8, pp. 1-21
compromised to attack. Naturally, risk analysis emerges, as it is one of many steps to provide a reliable security strategy …. However, the methodologies of any risk analysis must first adapt to the dynamics of the IoT system. This article seeks to shed … devices. Consequently, the importance of these factors in any risk evaluation is highlighted, especially the interdependence …