Электронная библиотека Финансового университета

     

Детальная информация

Research anthology on securing mobile technologies and applications / Information Resource Management Association, USA. — 1 online resource (xxix, 837 pages) : color illustrations. — "Critical Explorations" -- taken from front cover. — <URL:http://elib.fa.ru/ebsco/2916877.pdf>.

Дата создания записи: 15.03.2021

Тематика: Mobile computing — Security measures.; Cell phone systems — Security measures.; Computer crimes — Prevention.; Computer crimes — Prevention.

Коллекции: EBSCO

Разрешенные действия:

Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети

Группа: Анонимные пользователи

Сеть: Интернет

Аннотация

"This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"--.

Права на использование объекта хранения

Место доступа Группа пользователей Действие
Локальная сеть Финуниверситета Все Прочитать Печать Загрузить
Интернет Читатели Прочитать Печать
-> Интернет Анонимные пользователи

Оглавление

  • Cover
  • Title Page
  • Copyright Page
  • Editorial Advisory Board
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Cyber Attacks, Threat Detection, and Security Frameworks
    • Chapter 1: Smartphone Security and Forensic Analysis
    • Chapter 2: Mobile Agent Communication, Security Concerns, and Approaches
    • Chapter 3: Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges
    • Chapter 4: Identification of Cryptographic Vulnerability and Malware Detection in Android
    • Chapter 5: Android Botnets
    • Chapter 6: Preserving Security of Mobile Anchors Against Physical Layer Attacks
    • Chapter 7: A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set
    • Chapter 8: A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks
    • Chapter 9: A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network
    • Chapter 10: Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet
    • Chapter 11: Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment
    • Chapter 12: Simple Screen Locking Method Using Randomly Generated Number Grid on Image
    • Chapter 13: Phishing Attacks in Mobile Platforms
    • Chapter 14: A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques
    • Chapter 15: Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
    • Chapter 16: Securing Communication 2FA Using Post-Quantic Cryptosystem
  • Section 2: Data Protection, Privacy, and User Risk Awareness
    • Chapter 17: Smartphone Confrontational Applications and Security Issues
    • Chapter 18: Theft Preventive Measures for Interconnected Personal Computer Devices as Proactive Physical Security of Data
    • Chapter 19: Mobile Cyber Information Leakage
    • Chapter 20: Protection of the Communication and Digital Security of Mobile Phones as a Fundamental Right to Privacy
    • Chapter 21: Achieving Secure and Privacy-Preserving in Mobile Social Networks
    • Chapter 22: User Identity Hiding Method of Android
    • Chapter 23: Biometric Systems in Mobile Devices
    • Chapter 24: Cell Phone Security
    • Chapter 25: Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices
    • Chapter 26: Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation
    • Chapter 27: Expectations and Experiences of Implementing a Mobile Secure Communication Application
    • Chapter 28: Smart Phone Security Practices
    • Chapter 29: Awareness, Knowledge, and Ability of Mobile Security Among Young Mobile Phone Users
    • Chapter 30: Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France
  • Section 3: Security Issues for Apps, Mobile Banking, and Mobile Payment
    • Chapter 31: Threats and Vulnerabilities of Mobile Applications
    • Chapter 32: Techniques for Analysis of Mobile Malware
    • Chapter 33: Native vs. Hybrid Mobile Applications as Society Enters the Internet of Things
    • Chapter 34: Android Application Security
    • Chapter 35: A Hybrid Approach to Detect the Malicious Applications in Android-Based Smartphones Using Deep Learning
    • Chapter 36: Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches
    • Chapter 37: How Do Mobile Applications for Cancer Communicate About Their Privacy Practices?
    • Chapter 38: How Relevant Are Risk Perceptions, Effort, and Performance Expectancy in Mobile Banking Adoption?
    • Chapter 39: The Mediating Role of Perceived Value in the Effect of Multi-Dimensional Risk in Mobile Banking
    • Chapter 40: An Investigation into Permissions Requested by Mobile Banking on Android Platform
    • Chapter 41: Mobile Commerce Technologies and Management
    • Chapter 42: A Study of e-Commerce Transaction Risk Assessment Model in Mobile Internet
    • Chapter 43: LD Based Framework to Mitigate Threats in Mobile Based Payment System
    • Chapter 44: Identity Authentication Security Management in Mobile Payment Systems
  • Index

Статистика использования

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика