Fig. 4From: A decade of research on patterns and architectures for IoT securityResearch topics per publication venueBack to article page