A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
<p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and know...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| منشور في: |
2021
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513565648486400 |
|---|---|
| author | Koen Schaaf (14778139) |
| author2 | Bedir Tekinerdogan (6897839) Cagatay Catal (6897842) |
| author2_role | author author |
| author_facet | Koen Schaaf (14778139) Bedir Tekinerdogan (6897839) Cagatay Catal (6897842) |
| author_role | author |
| dc.creator.none.fl_str_mv | Koen Schaaf (14778139) Bedir Tekinerdogan (6897839) Cagatay Catal (6897842) |
| dc.date.none.fl_str_mv | 2021-06-14T21:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1002/cpe.6385 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/A_feature_based_approach_for_guiding_the_selection_of_Internet_of_Things_cybersecurity_standards_using_text_mining/22257982 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Mathematical sciences Numerical and computational mathematics Computational Theory and Mathematics Computer Networks and Communications Computer Science Applications Theoretical Computer Science Software |
| dc.title.none.fl_str_mv | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.</p><h2>Other Information</h2><p dir="ltr">Published in: Concurrency and Computation: Practice and Experience<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1002/cpe.6385" target="_blank">http://dx.doi.org/10.1002/cpe.6385</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_c04f1da96ac99a7a11ee2c87ae8b7555 |
| identifier_str_mv | 10.1002/cpe.6385 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/22257982 |
| publishDate | 2021 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text miningKoen Schaaf (14778139)Bedir Tekinerdogan (6897839)Cagatay Catal (6897842)Information and computing sciencesCybersecurity and privacyMathematical sciencesNumerical and computational mathematicsComputational Theory and MathematicsComputer Networks and CommunicationsComputer Science ApplicationsTheoretical Computer ScienceSoftware<p dir="ltr">Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.</p><h2>Other Information</h2><p dir="ltr">Published in: Concurrency and Computation: Practice and Experience<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1002/cpe.6385" target="_blank">http://dx.doi.org/10.1002/cpe.6385</a></p>2021-06-14T21:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1002/cpe.6385https://figshare.com/articles/journal_contribution/A_feature_based_approach_for_guiding_the_selection_of_Internet_of_Things_cybersecurity_standards_using_text_mining/22257982CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/222579822021-06-14T21:00:00Z |
| spellingShingle | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining Koen Schaaf (14778139) Information and computing sciences Cybersecurity and privacy Mathematical sciences Numerical and computational mathematics Computational Theory and Mathematics Computer Networks and Communications Computer Science Applications Theoretical Computer Science Software |
| status_str | publishedVersion |
| title | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| title_full | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| title_fullStr | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| title_full_unstemmed | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| title_short | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| title_sort | A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining |
| topic | Information and computing sciences Cybersecurity and privacy Mathematical sciences Numerical and computational mathematics Computational Theory and Mathematics Computer Networks and Communications Computer Science Applications Theoretical Computer Science Software |