Mehmet Ufuk ÇaĝlayanÇag̃layan, Mehmet UfukE. Gelenbe , M. Jankovic , D. Kehagias , A. Marton , A. Vilmos2025-10-0620229789819671748, 9789819664610, 9783032026743, 9783032008831, 9783032026712, 9789819671779, 9783031949425, 9789819666874, 9783031936968, 9783031941207978303109356218650937, 186509291865-092910.1007/978-3-031-09357-9_12-s2.0-85134331455https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134331455&doi=10.1007%2F978-3-031-09357-9_1&partnerID=40&md5=522340a7999da6c96cc891c8e50117d3https://gcris.yasar.edu.tr/handle/123456789/8817https://doi.org/10.1007/978-3-031-09357-9_1This article summarizes briefly the contributions presented in this EuroCyberSecurity Workshop 2021 which is organized as part of the series of International Symposia on Computer and Information Sciences (ISCIS) with the support of the European Commission funded IoTAC Project that was held on November and in NIce France and sponsored by the Institute of Teoretical and Applied Informatics of the Polish Academy of Sciences. It also summarizes some of the research contributions of several EU Projects including NEMESYS GHOST KONFIDO SDK4ED and IoTAC primarily with a cybersecurity and Machine Learning orientation. Thus subjects covered include the cybersecurity of Mobile Networks and of the Internet of Things (IoT) the design of IoT Gateways and their performance the security of networked health systems that provide health services to individuals across the EU Member states as well as the issues of energy consumption by ICT which are becoming increasingly important including in the cybersecurity perspective as we focus increasingly on climate change and the needed transition towards highly reduced emissions. Many of the techniques and results discussed in this article are based either on Machine Learning (ML) methods or on methods for the performance modeling and optimization of networked and distributed computer systems. © 2022 Elsevier B.V. All rights reserved.Englishinfo:eu-repo/semantics/openAccessAdaptive Routing, Attack Detection, Attack Mitigation, Cybersecurity, Ict Energy Optimization, Internet Of Things (iot), Iot Gateways, Iot Massive Access Problem, Secure Health Informatics, Secure Mobile Networks, Climate Change, Cybersecurity, Energy Utilization, Gateways (computer Networks), Health, Internet Of Things, Machine Learning, Mobile Security, Mobile Telecommunication Systems, Network Security, Quality Of Service, Adaptive Routing, Attack Detection, Attack Mitigation, Cyber Security, Energy Optimization, Health Informatics, Ict Energy Optimization, Internet Of Thing, Internet Of Thing Gateway, Internet Of Thing Massive Access Problem, Secure Health Informatic, Secure Mobile Network, Wireless NetworksClimate change, Cybersecurity, Energy utilization, Gateways (computer networks), Health, Internet of things, Machine learning, Mobile security, Mobile telecommunication systems, Network security, Quality of service, Adaptive routing, Attack detection, Attack mitigation, Cyber security, Energy optimization, Health informatics, ICT energy optimization, Internet of thing, Internet of thing gateway, Internet of thing massive access problem, Secure health informatic, Secure mobile network, Wireless networksICT Energy OptimizationSecure Health InformaticsAdaptive RoutingInternet of Things (IoT)Attack DetectionIoT GatewaysIoT Massive Access ProblemSecure Mobile NetworksAttack MitigationCybersecurityAI and Quality of Service Driven Attack Detection Mitigation and Energy Optimization: A Review of Some EU Project ResultsConference Object