Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13106)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ESORICS 2021.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 32 papers included in these proceedings stem from the following workshops:
- the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions;
- the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions;
- the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions;
- the 3rd Workshop on Security, Privacy, Organizations, andSystems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions.
- the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and
- the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions.
Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret
Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz
Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine
SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer
A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann
Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara HallinanSimilar content being viewed by others
Keywords
- cloud computing
- collaborative risk assessment
- critical infrastructures protection
- cyber defence
- cyber security
- cyber-physical security
- cyber-physical systems
- edge computing
- human factors
- industrial control systems
- network protocols
- network security
- organizations
- predictive security
- privacy engineering
- risk management
- security
- systems engineering
- usable privacy
- usable security
Table of contents (32 papers)
-
7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2021)
-
5th International Workshop on Security and Privacy Requirements Engineering (SECPRE 2021)
-
4th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2021)
Other volumes
-
Computer Security – ESORICS 2021
-
Computer Security – ESORICS 2021
-
Computer Security. ESORICS 2021 International Workshops
Editors and Affiliations
Bibliographic Information
Book Title: Computer Security. ESORICS 2021 International Workshops
Book Subtitle: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers
Editors: Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, … Marco Antonio Sotelo Monge
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-95484-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-030-95483-3Published: 08 February 2022
eBook ISBN: 978-3-030-95484-0Published: 07 February 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 578
Number of Illustrations: 18 b/w illustrations, 116 illustrations in colour
Topics: Systems and Data Security, Computer Systems Organization and Communication Networks, Information Systems Applications (incl. Internet), Cryptology, Computing Milieux