Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Contributors
About the Editors
Chapter 1: Mobile Security and Privacy
Abstract
1 Introduction
2 Threats to Mobile Security
3 Organization of the Book
Chapter 2: Mobile Security: A Practitioner’s Perspective
Abstract
Acknowledgments
1 Mobile Security
2 Principles
3 Application Stores
4 Approved Applications
5 Identity Management Issues
6 Privacy
7 Vulnerabilities
8 Threats
9 Risks
10 Mobile Security Strategy for Organizations that Develop Mobile Applications
11 Mitigations
12 Mobile Security Technical Controls
13 Forensics
14 Summary
15 Mobile Device Security Resources
Glossary
About the Authors
Chapter 3: Mobile Security: End Users are the Weakest Link in the System
Abstract
1 Definition: Security “Internetwork”
2 Growth of Smartphone Breaches
3 Organization Internetwork Security
4 Individual Internet Security
5 Conclusion
Chapter 4: How Cyber-Savvy are Older Mobile Device Users?
Abstract
Acknowledgments
1 Introduction
2 Survey Design
3 Findings and Discussion
4 A Situational Crime Prevention Approach
5 Conclusion
Chapter 5: The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective
Abstract
1 Introduction
2 Interactive Constable on Patrol System
3 Capabilities
4 Conclusion
Chapter 6: Supervised Learning Based Detection of Malware on Android
Abstract
Acknowledgments
1 Permission Background
2 Malware Landscape
3 Machine Learning
4 Characterization and Detection With the Consideration of User Security Specifications
5 Implementation
6 Evaluation and Discussion
7 Conclusion and Perspectives
Appendix A Different Combinations of Permissions and Determination of Risks
Appendix B Normal Applications for Testing
Chapter 7: On Discovering Vulnerabilities in Android Applications
Abstract
1 Introduction
2 Background
3 Modeling Common Vulnerabilities
4 Discovering Vulnerabilities
5 Discussion
6 Summary
About the Authors
Chapter 8: A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
Abstract
1 Introduction
2 An Overview of Android
3 Experiment Setup
4 Findings
5 Conclusion and Future Work
Conflict of Interest Declaration
Chapter 9: Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
Abstract
Acknowledgments
1 Introduction
2 Related Work
3 Digital Evidence in Shanzhai Phone
4 Timeline Analysis of the Digital Evidence
5 Conclusion
Chapter 10: RESTful IoT Authentication Protocols
Abstract
1 Introduction
2 REST Foundations
3 RESTful IoT Protocols
4 Security for RESTful IoT Protocols
5 REST Message Authentication
6 RESTful IoT Message Authentication
7 Conclusion and Outlook
Chapter 11: An Introduction to Various Privacy Models
Abstract
1 Introduction
2 Definition of k-Anonymity
3 Mechanisms That Support k-Anonymity
4 Differential Privacy
5 Laplace Mechanism to Achieve Differential Privacy
6 Conclusion
About the Authors
Chapter 12: Performance of Digital Signature Schemes on Mobile Devices
Abstract
Acknowledgments
1 Introduction
2 Related Work
3 The Experiment
4 Conclusion
About the Authors
Index
← Prev
Back
Next →
← Prev
Back
Next →