<p><i>Mobile Security and Privacy: Advances, Challenges and Future Research Directions</i> provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of every
Mobile Security and Privacy. Advances, Challenges and Future Research Directions
β Scribed by Man Ho Au, Raymond Choo
- Publisher
- Syngress
- Year
- 2016
- Tongue
- English
- Leaves
- 264
- Series
- Syngress advanced topics in information security
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.
β¦ Table of Contents
Content:
Front Matter,Copyright,Contributors,About the EditorsEntitled to full textChapter 1 - Mobile Security and Privacy, Pages 1-4
Chapter 2 - Mobile Security: A Practitionerβs Perspective, Pages 5-55
Chapter 3 - Mobile Security: End Users are the Weakest Link in the System, Pages 57-66
Chapter 4 - How Cyber-Savvy are Older Mobile Device Users?, Pages 67-83
Chapter 5 - The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitionerβs Perspective, Pages 85-99
Chapter 6 - Supervised Learning Based Detection of Malware on Android, Pages 101-154
Chapter 7 - On Discovering Vulnerabilities in Android Applications, Pages 155-166
Chapter 8 - A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps, Pages 167-203
Chapter 9 - Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone, Pages 205-216
Chapter 10 - RESTful IoT Authentication Protocols, Pages 217-234
Chapter 11 - An Introduction to Various Privacy Models, Pages 235-245
Chapter 12 - Performance of Digital Signature Schemes on Mobile Devices, Pages 247-256
Index, Pages 257-263
β¦ Subjects
Mobile computing;Security measures;COMPUTERS;Security;General
π SIMILAR VOLUMES
<p>This book contains a collection of projects and scenarios dealing with new risks from emerging technologies, future peace keeping operations, and water distribution issues by combining analysis with dialogue. Special attention is paid to the methodology of narrative scenarios, and the role of ima
<P><EM>Mobile and Wireless Network Security and Privacy</EM> analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the
<p><P>This edited volume, based upon the papers presented during the "Geospatial Technologies and Homeland Security Symposium" on Nov. 15, 2006, presents an overview of the latest development of geospatial technologies (including, but not limited to, GIS, RS, GPS, LBS, spatial analysis and modelling