首页> 外文期刊>Concurrency and computation: practice and experience >A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
【24h】

A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining

机译:一种基于特征的方法,用于指导使用文本挖掘的东西网络安全标准的选择

获取原文
获取原文并翻译 | 示例

摘要

Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.
机译:网络安全对于实现事物互联网(IOT)应用以及许多不同的标准来说是至关重要的。但是,选择相关标准并不琐碎,需要广泛了解网络安全和关于可用标准的知识。在本研究中,我们提出了一种系统的方法,指导IOT系统开发人员为其IOT项目选择相关的网络安全标准。系统方法已在四个阶段开发。首先,使用特征模型建模了IOT网络安全的常见和变体特征。其次,通过组合现有概述,映射了IOT网络安全标准景观的最新概述。第三,已经实施了文本挖掘算法。第四,系统方法已经使用业务流程建模符号进行了建模。我们的案例研究表明,这种方法是有效且有效地指导IOT网络安全标准的选择。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号