Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/intrusion-detection-and-prevention-for-mobile-ecosystems/descriptif_4033438
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4033438

Intrusion Detection and Prevention for Mobile Ecosystems Series in Security, Privacy and Trust Series

Langue : Anglais

Coordonnateurs : Kambourakis Georgios, Shabtai Asaf, Kolias Constantinos, Damopoulos Dimitrios

Couverture de l’ouvrage Intrusion Detection and Prevention for Mobile Ecosystems
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.

Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of Intrusion Detection and Prevention on Mobile Devices: The Last Decade. Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone Application Creation for End Users. Android Applications Privacy Risk Assessment. From Fuzziness to Criminal Investigation: An Inference System for Mobile Forensics. Malware Detection in Mobile Platforms: Function-Based Malware Detection Technique for Android. Detecting Android Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion: An Analysis of Grayware, Adsware, Spyware and Other Borderline Android Apps. Data Leakage in Mobile Malware: The What, the Why, and the How. Mobile Network Security and Intrustion Detection: Analysis of Mobile Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software Radio for Experimental Analysis of LTE Security, Protocol Exploits, and Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework. Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion Detection System in Self-Organizing Networks: A Survey. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. Intrusion Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns in Co-operative Intelligent Transportation Systems.

Georgios Kambourakis, PhD, earned a diploma in applied informatics from the Athens University of Economics and Business and a PhD in information and communication systems engineering from the Department of Information and Communications Systems Engineering of the University of the Aegean. He also earned a Master of Education (EdM) from the Hellenic Open University. Currently, Georgios is an associate professor at the Department of Information and Communication Systems Engineering, University of the Aegean, Greece, and the director of Info-Sec-Lab. His research interests are in the fields of mobile and wireless networks security and privacy, VoIP security, public key infrastructure, DNS security, and security education and he has more than 110 refereed publications in the above areas. He has guest edited special issues of several journals, including ACM/Springer Mobile Networks and Applications, Computer Standards & Interfaces, IEEE Computer Magazine, Information Sciences, and Computer Communications. He has been involved in several national and EU funded R&D projects in the areas of Information and Communication Systems Security. He is a reviewer for a plethora of IEEE and other international journals and has served as a technical program committee member for more than 200 international conferences in security and networking. More info at www.icsd.aegean.gr/gkamb

Asaf Shabtai, PhD, is a senior lecturer (assistant professor) in the Department of Software and Information Systems Engineering at Ben-Gurion University (BGU) of the Negev. Asaf is also a senior researcher at the Telekom Innovation Laboratories at BGU. Asaf is an expert in information systems security and has led several large-scale projects and researches in this field. His main areas of interests are security of computer networks and smart mobile devices, malware detection, fraud detection and credit risk prediction, data leakage detection, analysis of encrypted t

Date de parution :

15.6x23.4 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

56,31 €

Ajouter au panier

Date de parution :

15.6x23.4 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

Prix indicatif 160,25 €

Ajouter au panier