Intrusion Detection and Prevention for Mobile Ecosystems
โ Scribed by Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
- Publisher
- CRC Press
- Year
- 2017
- Tongue
- English
- Leaves
- 559
- Series
- Series in Security, Privacy and Trust
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem will be considered. Surveys, simulations, practical results and case studies would be also included.
โฆ Table of Contents
Content: Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of Intrusion Detection and Prevention on Mobile Devices: The Last Decade. Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone Application Creation for End Users. Android Applications Privacy Risk Assessment. From Fuzziness to Criminal Investigation: An Inference System for Mobile Forensics. Malware Detection in Mobile Platforms: Function-Based Malware Detection Technique for Android. Detecting Android Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion: An Analysis of Grayware, Adsware, Spyware and Other Borderline Android Apps. Data Leakage in Mobile Malware: The What, the Why, and the How. Mobile Network Security and Intrustion Detection: Analysis of Mobile Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software Radio for Experimental Analysis of LTE Security, Protocol Exploits, and Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework. Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion Detection System in Self-Organizing Networks: A Survey. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. Intrusion Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns in Co-operative Intelligent Transportation Systems.
โฆ Subjects
COMPUTERS / Internet / General;TECHNOLOGY & ENGINEERING / Telecommunications;Internet & Multimedia;IT Security;Telecommunications
๐ SIMILAR VOLUMES
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se
<span>Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Inter
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis,
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most