Intrusion Detection and Prevention for Mobile Ecosystems (eBook, ePUB)
Redaktion: Kambourakis, Georgios; Damopoulos, Dimitrios; Kolias, Constantinos; Shabtai, Asaf
46,95 €
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
46,95 €
Als Download kaufen
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
23 °P sammeln
Intrusion Detection and Prevention for Mobile Ecosystems (eBook, ePUB)
Redaktion: Kambourakis, Georgios; Damopoulos, Dimitrios; Kolias, Constantinos; Shabtai, Asaf
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book presents state-of-the-art contributions from scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, and practical experiences with intrusion detection and prevention.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 17.46MB
Andere Kunden interessierten sich auch für
- Intrusion Detection and Prevention for Mobile Ecosystems (eBook, PDF)46,95 €
- Artificial Intelligence for Intrusion Detection Systems (eBook, ePUB)52,95 €
- Intrusion Detection in Wireless Ad-Hoc Networks (eBook, ePUB)99,95 €
- Shabnam SodagariPrivacy and Security for Mobile Crowdsourcing (eBook, ePUB)101,95 €
- K. R. RaoWireless Multimedia Communication Systems (eBook, ePUB)104,95 €
- Ahmed BanafaIntroduction to Internet of Things (IoT) (eBook, ePUB)33,95 €
- Nazmul RajibCCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide (eBook, ePUB)36,95 €
-
-
-
This book presents state-of-the-art contributions from scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, and practical experiences with intrusion detection and prevention.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 558
- Erscheinungstermin: 6. September 2017
- Englisch
- ISBN-13: 9781315305813
- Artikelnr.: 49261416
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 558
- Erscheinungstermin: 6. September 2017
- Englisch
- ISBN-13: 9781315305813
- Artikelnr.: 49261416
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Georgios Kambourakis, PhD, earned a diploma in applied informatics from the Athens University of Economics and Business and a PhD in information and communication systems engineering from the Department of Information and Communications Systems Engineering of the University of the Aegean. He also earned a Master of Education (EdM) from the Hellenic Open University. Currently, Georgios is an associate professor at the Department of Information and Communication Systems Engineering, University of the Aegean, Greece, and the director of Info-Sec-Lab. His research interests are in the fields of mobile and wireless networks security and privacy, VoIP security, public key infrastructure, DNS security, and security education and he has more than 110 refereed publications in the above areas. He has guest edited special issues of several journals, including ACM/Springer Mobile Networks and Applications, Computer Standards & Interfaces, IEEE Computer Magazine, Information Sciences, and Computer Communications. He has been involved in several national and EU funded R&D projects in the areas of Information and Communication Systems Security. He is a reviewer for a plethora of IEEE and other international journals and has served as a technical program committee member for more than 200 international conferences in security and networking. More info at www.icsd.aegean.gr/gkamb Asaf Shabtai, PhD, is a senior lecturer (assistant professor) in the Department of Software and Information Systems Engineering at Ben-Gurion University (BGU) of the Negev. Asaf is also a senior researcher at the Telekom Innovation Laboratories at BGU. Asaf is an expert in information systems security and has led several large-scale projects and researches in this field. His main areas of interests are security of computer networks and smart mobile devices, malware detection, fraud detection and credit risk prediction, data leakage detection, analysis of encrypted traffic, security awareness, IoT security, development of security mechanisms for avionic systems, as well as the application of machine learning in the cyber security domain.He has published over 70 refereed papers in leading journals and conferences. In addition, he has coauthored a book on information leakage detection and prevention. He earned a BSc in mathematics and computer science (1998); a BSc in information systems engineering (1998); an MSc in information systems engineering (2003); and a PhD in information systems engineering (2011), all from Ben-Gurion University. Constantinos Kolias, PhD, is a research assistant professor at the George Mason University, Virginia. He earned a diploma in computer science from the Technological Educational Institute of Athens, Greece. He also earned an MSc and PhD in information and communication system security, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. His primary research interests lie in the field of security for Internet of Things, next-generation wireless communication protocols, intrusion detection for wireless networks, and mobile surveillance. Dimitrios Damopoulos, PhD, earned a BSc in industrial informatics from the Technological Educational Institute of Kavala, Greece. He also earned an MSc in information and communication systems security and a PhD in information and communication systems engineering, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. Currently, he is with Stevens Institute of Technology as an assistant professor. His research interests focus on smartphone security, mobile device intrusion detection and prevention systems, mobile malware, as well as mobile applications and services.
Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.
Intrusion Detection and Prevention on Mobile Devices: The Last Decade.
Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone
Application Creation for End Users. Android Applications Privacy Risk
Assessment. From Fuzziness to Criminal Investigation: An Inference System
for Mobile Forensics. Malware Detection in Mobile Platforms:
Function-Based Malware Detection Technique for Android. Detecting Android
Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion:
An Analysis of Grayware, Adsware, Spyware and Other Borderline Android
Apps. Data Leakage in Mobile Malware: The What, the Why, and the How.
Mobile Network Security and Intrustion Detection: Analysis of Mobile
Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software
Radio for Experimental Analysis of LTE Security, Protocol Exploits, and
Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework.
Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion
Detection System in Self-Organizing Networks: A Survey. A Survey of
Intrusion Detection Systems in Wireless Sensor Networks. Intrusion
Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns
in Co-operative Intelligent Transportation Systems.