E-Book, Englisch, 558 Seiten
Kambourakis / Shabtai / Kolias Intrusion Detection and Prevention for Mobile Ecosystems
Erscheinungsjahr 2017
ISBN: 978-1-315-30581-3
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 558 Seiten
Reihe: Series in Security, Privacy and Trust
ISBN: 978-1-315-30581-3
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem will be considered. Surveys, simulations, practical results and case studies would be also included.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Methods and practices for locating the source of attacks, Cross-layer based intrusion and prevention detection, Lightweight cryptography for dealing with intrusions and attacks in the mobile ecosystem, Intelligent detection of wireless or mobile attacks, Agent-based intrusion surveillance, detection and prevention. Novel attacks on wireless networks, mobile operating systems and services. Standardization efforts related to intrusion detection and prevention for the mobile ecosystem. Penetration testing tools and metrics of network assurance, Security and privacy considerations for the emerging field of Internet of Things. Malware detection, analysis and removal in mobile realms, Datasets and frameworks for the study of malware/intrusive mobile behavior, Trusted monitoring and data collection for malware intrusion detection, Efficient identification of malicious behavior prior and after installation, Mobile botnets, Mobile operating systems security and privacy (Android, iOS, Windows Phone, etc.), Identification of attacks against the wireless interfaces of devices (NFC, Bluetooth, WiFi, LTE, LTE-Advanced, etc.), Biometric user authentication and continuous authentication for Smartphones, Attacks on physical layer\MAC layer\Security infrastructure\Mobile OS, privacy leaks of wearable devices, Rooting and Jailbreaking of mobile platforms, Privacy and security issues for wearable devices, Users' awareness to security solutions for mobile devices