Детальная информация
Название | Research anthology on securing mobile technologies and applications |
---|---|
Организация | Information Resources Management Association, |
Коллекция | Электронные книги зарубежных издательств ; Общая коллекция |
Тематика | Mobile computing — Security measures. ; Cell phone systems — Security measures. ; Computer crimes — Prevention. ; EBSCO eBooks |
Тип документа | Другой |
Тип файла | |
Язык | Английский |
Права доступа | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Ключ записи | on1243012958 |
Дата создания записи | 15.03.2021 |
Разрешенные действия
pdf/2916877.pdf | – |
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
|
---|---|---|
epub/2916877.epub | – |
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
|
Группа | Анонимные пользователи |
---|---|
Сеть | Интернет |
"This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"--.
Место доступа | Группа пользователей | Действие |
---|---|---|
Локальная сеть ИБК СПбПУ | Все |
|
Интернет | Авторизованные пользователи СПбПУ |
|
Интернет | Анонимные пользователи |
|
- Cover
- Title Page
- Copyright Page
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Preface
- Section 1: Cyber Attacks, Threat Detection, and Security Frameworks
- Chapter 1: Smartphone Security and Forensic Analysis
- Chapter 2: Mobile Agent Communication, Security Concerns, and Approaches
- Chapter 3: Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges
- Chapter 4: Identification of Cryptographic Vulnerability and Malware Detection in Android
- Chapter 5: Android Botnets
- Chapter 6: Preserving Security of Mobile Anchors Against Physical Layer Attacks
- Chapter 7: A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set
- Chapter 8: A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks
- Chapter 9: A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network
- Chapter 10: Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet
- Chapter 11: Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment
- Chapter 12: Simple Screen Locking Method Using Randomly Generated Number Grid on Image
- Chapter 13: Phishing Attacks in Mobile Platforms
- Chapter 14: A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques
- Chapter 15: Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
- Chapter 16: Securing Communication 2FA Using Post-Quantic Cryptosystem
- Section 2: Data Protection, Privacy, and User Risk Awareness
- Chapter 17: Smartphone Confrontational Applications and Security Issues
- Chapter 18: Theft Preventive Measures for Interconnected Personal Computer Devices as Proactive Physical Security of Data
- Chapter 19: Mobile Cyber Information Leakage
- Chapter 20: Protection of the Communication and Digital Security of Mobile Phones as a Fundamental Right to Privacy
- Chapter 21: Achieving Secure and Privacy-Preserving in Mobile Social Networks
- Chapter 22: User Identity Hiding Method of Android
- Chapter 23: Biometric Systems in Mobile Devices
- Chapter 24: Cell Phone Security
- Chapter 25: Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices
- Chapter 26: Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation
- Chapter 27: Expectations and Experiences of Implementing a Mobile Secure Communication Application
- Chapter 28: Smart Phone Security Practices
- Chapter 29: Awareness, Knowledge, and Ability of Mobile Security Among Young Mobile Phone Users
- Chapter 30: Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France
- Section 3: Security Issues for Apps, Mobile Banking, and Mobile Payment
- Chapter 31: Threats and Vulnerabilities of Mobile Applications
- Chapter 32: Techniques for Analysis of Mobile Malware
- Chapter 33: Native vs. Hybrid Mobile Applications as Society Enters the Internet of Things
- Chapter 34: Android Application Security
- Chapter 35: A Hybrid Approach to Detect the Malicious Applications in Android-Based Smartphones Using Deep Learning
- Chapter 36: Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches
- Chapter 37: How Do Mobile Applications for Cancer Communicate About Their Privacy Practices?
- Chapter 38: How Relevant Are Risk Perceptions, Effort, and Performance Expectancy in Mobile Banking Adoption?
- Chapter 39: The Mediating Role of Perceived Value in the Effect of Multi-Dimensional Risk in Mobile Banking
- Chapter 40: An Investigation into Permissions Requested by Mobile Banking on Android Platform
- Chapter 41: Mobile Commerce Technologies and Management
- Chapter 42: A Study of e-Commerce Transaction Risk Assessment Model in Mobile Internet
- Chapter 43: LD Based Framework to Mitigate Threats in Mobile Based Payment System
- Chapter 44: Identity Authentication Security Management in Mobile Payment Systems
- Index