A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining

<p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and know...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Koen Schaaf (14778139) (author)
مؤلفون آخرون: Bedir Tekinerdogan (6897839) (author), Cagatay Catal (6897842) (author)
منشور في: 2021
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513565648486400
author Koen Schaaf (14778139)
author2 Bedir Tekinerdogan (6897839)
Cagatay Catal (6897842)
author2_role author
author
author_facet Koen Schaaf (14778139)
Bedir Tekinerdogan (6897839)
Cagatay Catal (6897842)
author_role author
dc.creator.none.fl_str_mv Koen Schaaf (14778139)
Bedir Tekinerdogan (6897839)
Cagatay Catal (6897842)
dc.date.none.fl_str_mv 2021-06-14T21:00:00Z
dc.identifier.none.fl_str_mv 10.1002/cpe.6385
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/A_feature_based_approach_for_guiding_the_selection_of_Internet_of_Things_cybersecurity_standards_using_text_mining/22257982
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Numerical and computational mathematics
Computational Theory and Mathematics
Computer Networks and Communications
Computer Science Applications
Theoretical Computer Science
Software
dc.title.none.fl_str_mv A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.</p><h2>Other Information</h2><p dir="ltr">Published in: Concurrency and Computation: Practice and Experience<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1002/cpe.6385" target="_blank">http://dx.doi.org/10.1002/cpe.6385</a></p>
eu_rights_str_mv openAccess
id Manara2_c04f1da96ac99a7a11ee2c87ae8b7555
identifier_str_mv 10.1002/cpe.6385
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/22257982
publishDate 2021
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text miningKoen Schaaf (14778139)Bedir Tekinerdogan (6897839)Cagatay Catal (6897842)Information and computing sciencesCybersecurity and privacyMathematical sciencesNumerical and computational mathematicsComputational Theory and MathematicsComputer Networks and CommunicationsComputer Science ApplicationsTheoretical Computer ScienceSoftware<p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.</p><h2>Other Information</h2><p dir="ltr">Published in: Concurrency and Computation: Practice and Experience<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1002/cpe.6385" target="_blank">http://dx.doi.org/10.1002/cpe.6385</a></p>2021-06-14T21:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1002/cpe.6385https://figshare.com/articles/journal_contribution/A_feature_based_approach_for_guiding_the_selection_of_Internet_of_Things_cybersecurity_standards_using_text_mining/22257982CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/222579822021-06-14T21:00:00Z
spellingShingle A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Koen Schaaf (14778139)
Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Numerical and computational mathematics
Computational Theory and Mathematics
Computer Networks and Communications
Computer Science Applications
Theoretical Computer Science
Software
status_str publishedVersion
title A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
title_full A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
title_fullStr A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
title_full_unstemmed A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
title_short A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
title_sort A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
topic Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Numerical and computational mathematics
Computational Theory and Mathematics
Computer Networks and Communications
Computer Science Applications
Theoretical Computer Science
Software