Cybersecurity risk assessment for identifying threats, vulnerabilities and countermeasures in the IoT. Mesopotamian Journal of CyberSecurity, [S. l.], v. 5, n. 2, p. 514–537, 2025. DOI: 10.58496/MJCS/2025/032. Disponível em: https://mesopotamian.press/journals/index.php/CyberSecurity/article/view/829. Acesso em: 11 jul. 2025.