Fig. 3From: A decade of research on patterns and architectures for IoT securityPublications per year, per venue typeBack to article page