Fig. 7From: A decade of research on patterns and architectures for IoT securityDifference between academic-only and joint papers in terms of security and privacy concernsBack to article page