000 08914nam a22008175i 4500
001 978-3-030-95484-0
003 DE-He213
005 20240423130307.0
007 cr nn 008mamaa
008 220207s2022 sz | s |||| 0|eng d
020 _a9783030954840
_9978-3-030-95484-0
024 7 _a10.1007/978-3-030-95484-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aComputer Security. ESORICS 2021 International Workshops
_h[electronic resource] :
_bCyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers /
_cedited by Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aX, 578 p. 134 illus., 116 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v13106
505 0 _aCyberICPS 2021 -- Communication and Cybersecurity Testbed for Autonomous Passenger Ship -- A Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems -- GLASS: Towards Secure and Decentralized eGovernance Services using IPFS -- Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis -- Attack path analysis and cost-efficient selection of cybersecurity controls for com-plex cyberphysical systems -- Analysis of Cyber Security features in Industry 4.0 Maturity Models -- Cybersafety analysis of a natural language user interface for a consumer robotic System -- SECPRE 2021 -- Integrating Privacy-by-Design with Business Process Redesign -- Disclosing Social and Location Attributes on Social Media: The Impact on Users’ Privacy -- BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System -- Privacy and Informational Self-determination through Informed Consent: the Way Forward -- Building a Privacy Testbed: Use Cases and Design Considerations -- ADIoT 2021 -- Assessing Vulnerabilities and IoT-enabled Attacks on Smart Lighting Systems -- TAESim: A Testbed for IoT Security Analysis of Trigger-action Environment -- Adversarial Command Detection Using Parallel Speech Recognition Systems -- Security Measuring System for IoT Devices -- Battery Depletion Attacks on NB-IoT Devices using Interference -- Security- and privacy-aware IoT application placement and user assignment -- Room Identification with Personal Voice Assistants (Extended Abstract) -- SPOSE 2021 -- Why IT Security Needs Therapy -- Transferring Update Behavior from Smartphones to Smart Consumer Devices -- Organisational Contexts of Energy Cybersecurity -- SMILE - Smart eMaIl Link domain Extractor -- A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper) -- Data Protection Impact Assessments in Practice - Experiences from Case Studies -- CPS4CIP 2021 -- Resilience quantification for critical infrastructure: Exemplified for airport Operations -- Severity level assessment from semantically fused video content analysis for physical threat detection in ground segments of space systems -- Diminisher: A Linux Kernel based Countermeasure for TAA Vulnerability -- The Rise of ICS Malware: A Comparative Analysis -- CDT& SECOMANE 2021 -- Framework proposal to measure the Stress as Adversarial Factor on Cyber Decision Making -- Measuring the impact of Tactical Denial of Sustainability -- A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data.
520 _aThis book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 32 papers included in these proceedings stem from the following workshops: the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions; the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions; the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, andSystems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions. the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions. The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com: Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by TaniaWallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan .
650 0 _aData protection.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aApplication software.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputers.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aCryptology.
650 2 4 _aComputing Milieux.
700 1 _aKatsikas, Sokratis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLambrinoudakis, Costas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCuppens, Nora.
_eeditor.
_0(orcid)
_10000-0001-8792-0413
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMylopoulos, John.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKalloniatis, Christos.
_eeditor.
_0(orcid)
_10000-0002-8844-2596
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMeng, Weizhi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aFurnell, Steven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPallas, Frank.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPohle, Jörg.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSasse, M. Angela.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAbie, Habtamu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRanise, Silvio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVerderame, Luca.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCambiaso, Enrico.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMaestre Vidal, Jorge.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSotelo Monge, Marco Antonio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030954833
776 0 8 _iPrinted edition:
_z9783030954857
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v13106
856 4 0 _uhttps://doi.org/10.1007/978-3-030-95484-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c187066
_d187066