Fig. 1From: A decade of research on patterns and architectures for IoT securityThe process of planning, conducting, and reporting a SLR (Kitchenham and Charters 2007)Back to article page