Research Article

Analyzing IoT Attack Feature Association with Threat Actors

Figure 2

Proposed updated Delphi method with the proposed algorithm.