Intrusion Detection and Prevention for Mobile Ecosystems
Herausgeber: Kambourakis, Georgios; Shabtai, Asaf; Kolias, Constantinos
Intrusion Detection and Prevention for Mobile Ecosystems
Herausgeber: Kambourakis, Georgios; Shabtai, Asaf; Kolias, Constantinos
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.
Andere Kunden interessierten sich auch für
- AI-Centric Smart City Ecosystems68,99 €
- Gabrielle TaylorMisinformation Detection64,99 €
- Sebastian ThalananyMobile Evolution63,99 €
- Xiaorui ZhuAutonomous Mobile Robots in Unknown Outdoor Environments65,99 €
- Subir Kumar SarkarAd Hoc Mobile Wireless Networks81,99 €
- Arun Kumar H DVideo Traffic Analysis for Abnormal Events Detection and Classification29,99 €
- Meenu VijaraniaDeep Learning Techniques for Detection of COPD30,99 €
-
-
-
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 560
- Erscheinungstermin: 30. Juni 2020
- Englisch
- Abmessung: 234mm x 156mm x 30mm
- Gewicht: 840g
- ISBN-13: 9780367573065
- ISBN-10: 0367573067
- Artikelnr.: 69894900
- Verlag: CRC Press
- Seitenzahl: 560
- Erscheinungstermin: 30. Juni 2020
- Englisch
- Abmessung: 234mm x 156mm x 30mm
- Gewicht: 840g
- ISBN-13: 9780367573065
- ISBN-10: 0367573067
- Artikelnr.: 69894900
Georgios Kambourakis, PhD, earned a diploma in applied informatics from the Athens University of Economics and Business and a PhD in information and communication systems engineering from the Department of Information and Communications Systems Engineering of the University of the Aegean. He also earned a Master of Education (EdM) from the Hellenic Open University. Currently, Georgios is an associate professor at the Department of Information and Communication Systems Engineering, University of the Aegean, Greece, and the director of Info-Sec-Lab. His research interests are in the fields of mobile and wireless networks security and privacy, VoIP security, public key infrastructure, DNS security, and security education and he has more than 110 refereed publications in the above areas. He has guest edited special issues of several journals, including ACM/Springer Mobile Networks and Applications, Computer Standards & Interfaces, IEEE Computer Magazine, Information Sciences, and Computer Communications. He has been involved in several national and EU funded R&D projects in the areas of Information and Communication Systems Security. He is a reviewer for a plethora of IEEE and other international journals and has served as a technical program committee member for more than 200 international conferences in security and networking. More info at www.icsd.aegean.gr/gkamb Asaf Shabtai, PhD, is a senior lecturer (assistant professor) in the Department of Software and Information Systems Engineering at Ben-Gurion University (BGU) of the Negev. Asaf is also a senior researcher at the Telekom Innovation Laboratories at BGU. Asaf is an expert in information systems security and has led several large-scale projects and researches in this field. His main areas of interests are security of computer networks and smart mobile devices, malware detection, fraud detection and credit risk prediction, data leakage detection, analysis of encrypted traffic, security awareness, IoT security, development of security mechanisms for avionic systems, as well as the application of machine learning in the cyber security domain.He has published over 70 refereed papers in leading journals and conferences. In addition, he has coauthored a book on information leakage detection and prevention. He earned a BSc in mathematics and computer science (1998); a BSc in information systems engineering (1998); an MSc in information systems engineering (2003); and a PhD in information systems engineering (2011), all from Ben-Gurion University. Constantinos Kolias, PhD, is a research assistant professor at the George Mason University, Virginia. He earned a diploma in computer science from the Technological Educational Institute of Athens, Greece. He also earned an MSc and PhD in information and communication system security, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. His primary research interests lie in the field of security for Internet of Things, next-generation wireless communication protocols, intrusion detection for wireless networks, and mobile surveillance. Dimitrios Damopoulos, PhD, earned a BSc in industrial informatics from the Technological Educational Institute of Kavala, Greece. He also earned an MSc in information and communication systems security and a PhD in information and communication systems engineering, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. Currently, he is with Stevens Institute of Technology as an assistant professor. His research interests focus on smartphone security, mobile device intrusion detection and prevention systems, mobile malware, as well as mobile applications and services.
Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.