Research Article

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

Figure 5

Taxonomy for IoT attack background.