Intrusion Detection and Prevention for Mobile Ecosystems
- Length: 558 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2017-09-06
- ISBN-10: 113803357X
- ISBN-13: 9781138033573
- Sales Rank: #11116992 (See Top 100 Books)
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.
Table of Contents
Section I: Mobile Platforms Security, Privacy, and Intrusion Detection
Chapter 1. A Review Of Intrusion Detection And Prevention On Mobile Devices: The Last Decade
Chapter 2. Attacking Smartphone Security And Privacy
Chapter 3. Reliable Ad Hoc Smartphone Application Creation For End Users
Chapter 4. Android Applications Privacy Risk Assessment
Chapter 5. From Fuzziness To Criminal Investigation: An Inference System For Mobile Forensics
Section II: Malware Detection in Mobile Platforms
Chapter 6. Function-Based Malware Detection Technique For Android
Chapter 7. Detecting Android Kernel Rootkits Via Jtag Memory Introspection
Chapter 8. Various Shades Of Intrusion: An Analysis Of Grayware, Adsware, Spyware, And Other Borderline Android Apps
Chapter 9. Data Leakage In Mobile Malware: The What, The Why, And The How
Section III: Mobile Network Security and Intrusion Detection
Chapter 10. Analysis Of Mobile Botnets Using A Hybrid Experimental Platform
Chapter 11. Applying Low-Cost Software Radio For Experimental Analysis Of Lte Security, Protocol Exploits, And Location Leaks
Chapter 12. A Comprehensive Sms-Based Intrusion Detection Framework
Section IV: Intrusion Detection in Dynamic and Self-Organizing Networks
Chapter 13. Intrusion Detection System In Self-Organizing Networks: A Survey
Chapter 14. A Survey Of Intrusion Detection Systems In Wireless Sensor Networks
Chapter 15. Intrusion Detection And Tolerance For 6Lowpan-Based Wsns Using Mmt
Chapter 16. Security Concerns In Cooperative Intelligent Transportation Systems
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.