Chapter 1: Mobile Security and Privacy
Chapter 2: Mobile Security: A Practitioner’s Perspective
10 Mobile Security Strategy for Organizations that Develop Mobile Applications
12 Mobile Security Technical Controls
15 Mobile Device Security Resources
Chapter 3: Mobile Security: End Users are the Weakest Link in the System
1 Definition: Security “Internetwork”
2 Growth of Smartphone Breaches
3 Organization Internetwork Security
4 Individual Internet Security
Chapter 4: How Cyber-Savvy are Older Mobile Device Users?
4 A Situational Crime Prevention Approach
2 Interactive Constable on Patrol System
Chapter 6: Supervised Learning Based Detection of Malware on Android
4 Characterization and Detection With the Consideration of User Security Specifications
Appendix A Different Combinations of Permissions and Determination of Risks
Appendix B Normal Applications for Testing
Chapter 7: On Discovering Vulnerabilities in Android Applications
3 Modeling Common Vulnerabilities
Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
Conflict of Interest Declaration
Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
3 Digital Evidence in Shanzhai Phone
4 Timeline Analysis of the Digital Evidence
Chapter 10: RESTful IoT Authentication Protocols
4 Security for RESTful IoT Protocols
6 RESTful IoT Message Authentication
Chapter 11: An Introduction to Various Privacy Models
3 Mechanisms That Support k-Anonymity
5 Laplace Mechanism to Achieve Differential Privacy
Chapter 12: Performance of Digital Signature Schemes on Mobile Devices