Security Metrics Analysis

Data extracted from the papers

This is the data set used to carry out a systematic review of the literature to find the metrics that have been proposed so far. The data sources used were online databases, conference proceedings and academic journals of IEEE Xplore, Elsevier, AMC Digital Library, Springer, along with Google Scholar search engine. The objective is to analyze to what extent the proposed metrics can be applicable to the security evaluation of Embedded Systems.

  1. Initial set of metrics
  2. First reduction of the data
  3. Second reduction of the data
  4. Thirds reduction of the data
  5. Fourth reduction of the data
  6. Fifth reduction of the data

Continuous Analysis

This image represents the ideal result that we would like to obtain.