Protecting Mobile Networks and Devices: Challenges and Solutions

  • 7h 7m
  • Jianying Zhou (eds), Steven Furnell, Weizhi Meng, Xiapu Luo
  • CRC Press
  • 2017
  • Gathers and analyzes the latest attacks, solutions, and trends in mobile networks
  • Covers attacks and solutions related to mobile networks, mobile phone security, and wireless security
  • Examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues
  • Includes many attack samples that present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

In this Book

  • Introduction
  • Exploring Mobile Authentication Mechanisms from Personal Identification Numbers to Biometrics Including the Future Trend
  • When Seeing is Not Believing—Defeating MFF-Based Attacks Using Liveness Detection for Face Authentication on Mobile Platforms
  • Visual Authentication Based on Visual Cryptography Using Mobile Devices
  • Dealing with User Privacy in Mobile Apps—Issues and Mitigation
  • An Empirical Study on Android for Saving Nonshared Data on Public Storage,
  • Security Analysis on Android and iOS
  • Protecting Android Apps against Reverse Engineering
  • Efficient Classification of Android Malware in the Wild Using Robust Static Features
  • An Empirical Analysis of Android Banking Malware
  • Physical Layer Security in the Last Mile Technology of Mobile Networks
  • Protecting Mobile Payments Security—A Case Study
  • Cyberattack Surface of Next-Generation Mobile Networks
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)