{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:18:59Z","timestamp":1743092339261,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_15","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"165-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of Human Awareness of Security and Privacy Threats in Smart Environments"],"prefix":"10.1007","author":[{"given":"Luca","family":"Caviglione","sequence":"first","affiliation":[]},{"given":"Jean-Fran\u00e7ois","family":"Lalande","sequence":"additional","affiliation":[]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Al-kahtani, M.: Survey on security attacks in vehicular ad hoc networks (VANETs). In: 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1\u20139, December 2012","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Arfaoui, G., Gharout, S., Traor\u00e9, J.: Trusted execution environments: a look under the hood. In: The International Workshop on Trusted Platforms for Mobile and Cloud Computing, pp. 259\u2013266. IEEE Computer Society, Oxford, April 2014","DOI":"10.1109\/MobileCloud.2014.47"},{"key":"15_CR3","unstructured":"Bronkhorst, A., Post, W., te Brake, G.: From human factors to HSI and beyond: design of operations centers and control rooms. In: 9th Future Security - Security Research Conference, pp. 140\u2013146. MEV Verlag, September 2014"},{"issue":"10","key":"15_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1361-3723(11)70104-X","volume":"2011","author":"L Caviglione","year":"2011","unstructured":"Caviglione, L., Coccoli, M.: Privacy problems with web 2.0. Comput. Fraud Secur. 2011(10), 16\u201319 (2011)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2015.31","volume":"48","author":"L Caviglione","year":"2015","unstructured":"Caviglione, L., Mazurczyk, W.: Understanding information hiding in iOS. IEEE Comput. Mag. 48(1), 62\u201365 (2015)","journal-title":"IEEE Comput. Mag."},{"key":"15_CR6","unstructured":"Checkoway, S., McCoy, D., Kantor, B., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, pp. 6. USENIX Association, Berkeley (2011)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Bellache, M., Pierre, S., Quintero, A.: VANET security surveys. Comput. Commun. 44, 1\u201313 (2014)","journal-title":"Comput. Commun."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, p. 3. ACM Press, New York, October 2011","DOI":"10.1145\/2046614.2046618"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","volume":"46","author":"U Franke","year":"2014","unstructured":"Franke, U., Brynielsson, J.: Cyber situational awareness - a systematic review of the literature. Comput. Sec. 46, 18\u201331 (2014)","journal-title":"Comput. Sec."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M.O., Nunez del Prado Cortez, M.: De-anonymization attack on geolocated data. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 789\u2013797 (2013)","DOI":"10.1109\/TrustCom.2013.96"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Granzer, W., Kastner, W., Neugschwandtner, G., Praus, F.: Security in networked building automation systems. In: 2006 IEEE International Workshop on Factory Communication Systems, pp. 283\u2013292 (2006)","DOI":"10.1109\/WFCS.2006.1704168"},{"issue":"11","key":"15_CR12","doi-asserted-by":"publisher","first-page":"3622","DOI":"10.1109\/TIE.2009.2036033","volume":"57","author":"W Granzer","year":"2010","unstructured":"Granzer, W., Praus, F., Kastner, W.: Security in building automation systems. IEEE Trans. Indus. Electron. 57(11), 3622\u20133630 (2010)","journal-title":"IEEE Trans. Indus. Electron."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (S&P), pp. 447\u2013462, May 2010","DOI":"10.1109\/SP.2010.34"},{"key":"15_CR14","unstructured":"Lipi\u0144ski, B., Mazurczyk, W., Szczypiorski, K., \u015amietanka, P.: Towards effective security framework for vehicular ad-hoc networks. In: Proceedings of 5th International Conference on Networking and Information Technology (ICNIT 2014) (2014)"},{"issue":"8","key":"15_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(14)70080-7","volume":"2014","author":"M Lowe","year":"2014","unstructured":"Lowe, M.: Defending against cyber-criminals targeting business websites. Netw. Sec. 2014(8), 11\u201313 (2014)","journal-title":"Netw. Sec."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Chen, L., Hongbo Tang, J.W.: Analysis of VANET security based on routing protocol information. In: Proceedings 4th International Conference Intelligent Control and Information Processing (2013)","DOI":"10.1109\/ICICIP.2013.6568055"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Martin, T., Hsiao, M., Ha, D.S., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications, PerCom 2004, pp. 309\u2013318. IEEE (2004)","DOI":"10.1109\/PERCOM.2004.1276868"},{"issue":"99","key":"15_CR18","first-page":"1","volume":"PP","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surv. Tutor. PP(99), 1 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"15_CR19","unstructured":"Moore, H.: Security flaws in universal plug and play. Technical report, January, Rapid7 (2013). https:\/\/community.rapid7.com\/docs\/DOC-2150"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Mundt, T., Kruger, F., Wollenberg, T.: Who refuses to wash hands? privacy issues in modern house installation networks. In: Proceedings 7th International Conference Broadband, Wireless Computing, Communication and Applications, pp. 271\u2013277, November 2012","DOI":"10.1109\/BWCCA.2012.51"},{"key":"15_CR21","unstructured":"N\u00f6ldgen, M., Bach, A., Heinz, T.: Integration of resilience engineering in the trans-disciplinary building design process. In: Proceedings 9th Future Security - Security Research Conference, pp. 125\u2013132. MEV Verlag, September 2014"},{"key":"15_CR22","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Evaluating android anti-malware against transformation attacks. In: 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 329\u2013334. ACM Press, Hangzhou (2013)"},{"issue":"8","key":"15_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSPEC.2003.1222043","volume":"40","author":"D Snoonian","year":"2003","unstructured":"Snoonian, D.: Smart buildings. IEEE Spectr. 40(8), 18\u201323 (2003)","journal-title":"IEEE Spectr."},{"key":"15_CR24","unstructured":"Biswas, S., Jelena Misic, V.M.: Performance analysis of black hole attack in vanet. In: Proceedings of 31st Interenational Conference Distributed Computing Systems (2011)"},{"key":"15_CR25","unstructured":"Szl\u00f3sarczyk, S., Wendzel, S., Meier, M., Schubet, F., Kaur, J.: Towards suppressing attacks on and improving resilience of building automation systems - an approach exemplified using BACnet. In: Proceedings Sicherheit 2014, GI, pp. 407\u2013418 (2014)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Wendzel, S., Kahler, B., Rist, T.: Covert channels and their prevention in building automation protocols - a prototype exemplified using BACnet. In: Proceedings 2nd Workshop on Security of Systems and Software Resiliency, pp. 731\u2013736. IEEE (2012)","DOI":"10.1109\/GreenCom.2012.120"},{"key":"15_CR27","unstructured":"Wendzel, S., Zwanger, V., Meier, M., Szl\u00f3sarczyk, S.: Envisioning smart building botnets. In: Proceedings Sicherheit 2014, LNI, GI, March 2014, vol. 228, pp. 319\u2013329 (2014)"},{"key":"15_CR28","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-658-06708-3_9","volume-title":"ISSE 2014 Securing Electronic Business Processes","author":"S Wendzel","year":"2014","unstructured":"Wendzel, S., Mazurczyk, W., Caviglione, L., Meier, M.: Hidden and uncontrolled-on the emergence of network steganographic threats. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2014 Securing Electronic Business Processes, pp. 123\u2013133. Springer, Wiesbaden (2014)"},{"issue":"4","key":"15_CR29","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217\u2013241 (2012)","journal-title":"Telecommun. Syst."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T09:47:34Z","timestamp":1691833654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}