{"title":"Universal Privacy Risk Area Assessment Methodology","authors":"S. Ziegler","doi":"10.1007/978-3-030-04984-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_7","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Data Protection Norms and Their Impact on the Internet of Things","authors":"L. Bolognini, S. Ziegler","doi":"10.1007/978-3-030-04984-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_6","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133952551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things Cybersecurity Paradigm Shift, Threat Matrix and Practical Taxonomy","authors":"S. Ziegler","doi":"10.1007/978-3-030-04984-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_1","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Brékine, Anastasios Papathanasiou, Dimitrios Kavallieros, S. Ziegler, Christopher Hemmens, Adrian Quesada Rodriguez, Georgios Germanos, Georgios Kokkinis, G. Leventakis, J. Armin, John M. A. Bothos
{"title":"Network Threat Analysis","authors":"A. Brékine, Anastasios Papathanasiou, Dimitrios Kavallieros, S. Ziegler, Christopher Hemmens, Adrian Quesada Rodriguez, Georgios Germanos, Georgios Kokkinis, G. Leventakis, J. Armin, John M. A. Bothos","doi":"10.1007/978-3-030-04984-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_5","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133427139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Trustable Internet of Things Certification","authors":"Lucio Scudiero, S. Ziegler","doi":"10.1007/978-3-030-04984-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_9","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and Cloud Computing: Specific Security and Data Protection Issues","authors":"L. Bolognini, P. Balboni","doi":"10.1007/978-3-030-04984-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_4","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-Node Security","authors":"A. Skarmeta, D. Carrillo, Alexis Olivereau","doi":"10.1007/978-3-030-04984-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_3","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ziegler, Cédric Crettaz, Eunah Kim, A. Skarmeta, Jorge Bernal Bernabé, Rubén Trapero, Stefano Bianchi
{"title":"Privacy and Security Threats on the Internet of Things","authors":"S. Ziegler, Cédric Crettaz, Eunah Kim, A. Skarmeta, Jorge Bernal Bernabé, Rubén Trapero, Stefano Bianchi","doi":"10.1007/978-3-030-04984-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_2","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Privacy and Security in Smart Cities","authors":"S. Ziegler, M. Menon, Pasquale Annichino","doi":"10.1007/978-3-030-04984-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_11","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voluntary Compliance Commitment Tool for European General Data Protection Regulation","authors":"L. Bolognini, Camilla Bistolfi, S. Ziegler","doi":"10.1007/978-3-030-04984-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-04984-3_10","url":null,"abstract":"","PeriodicalId":416811,"journal":{"name":"Internet of Things Security and Data Protection","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}