Fig. 2From: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking processIoT risk assessment theoriesBack to article page