Research Article

SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things

Figure 15

Behavioral evaluation results from two sources of context.
(a)
(b)