Vui lòng dùng định danh này để trích dẫn hoặc liên kết đến tài liệu này: http://thuvienso.vanlanguni.edu.vn/handle/Vanlang_TV/33429
Toàn bộ biểu ghi siêu dữ liệu
Trường DCGiá trị Ngôn ngữ
dc.contributor.authorKambourakis, Georgios-
dc.contributor.authorGómez Mármol, Félix-
dc.contributor.authorWang (Eds.), Guojun-
dc.date.accessioned2021-08-12T10:11:16Z-
dc.date.available2021-08-12T10:11:16Z-
dc.date.issued2018-
dc.identifier.issn978-3-03842-779-7-
dc.identifier.urihttp://thuvienso.vanlanguni.edu.vn/handle/Vanlang_TV/33429-
dc.descriptionvi, 162 p. ; 20,2 Mb ; https://doi.org/10.3390/books978-3-03842-780-3 ; CC BY-NC-NDvi
dc.description.abstract"Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed. To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges."vi
dc.description.tableofcontents"About the Special Issue Editors ..................................... v Georgios Kambourakis, Felix Gomez Marmol and Guojun Wang Security and Privacy in Wireless and Mobile Networks doi: 10.3390/fi10020018 ......................................... 1 Wenjuan Li, Weizhi Meng and Lam For Kwok Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks † doi: 10.3390/fi10010006 ......................................... 4 Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs doi: 10.3390/fi10010001 ......................................... 20 Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning doi: 10.3390/fi9010007 ......................................... 37 Zhibin Zhou An Anonymous Offline RFID Grouping-Proof Protocol doi: 10.3390/fi10010002 ......................................... 52 Pierpaolo Loreti, Lorenzo Bracciale and Alberto Caponi Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications doi: 10.3390/fi10020013 ......................................... 67 Stylianos S. Mamais and George Theodorakopoulos Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems doi: 10.3390/fi9040088 ......................................... 84 Stylianos S. Mamais and George Theodorakopoulos Private and Secure Distribution of Targeted Advertisements to Mobile Phones doi: 10.3390/fi9020016 ......................................... 107 Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas User Modelling Validation over the Security Awareness of Digital Natives doi: 10.3390/fi9030032 ......................................... 128 Andrea Guazzini, Ay¸ca Sara¸c, Camillo Donati, Annalisa Nardi, Daniele Vilone and Patrizia Meringolo Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish doi: 10.3390/fi9020011 ......................................... 144"vi
dc.language.isoenvi
dc.publisherMDPIvi
dc.subjectSecurityvi
dc.subjectprivacyvi
dc.subjectmobilevi
dc.subjectwirelessvi
dc.subjectthreatvi
dc.subjectattackvi
dc.subjectvulnerabilityvi
dc.subjectdefensevi
dc.subjectintrusionvi
dc.subjectanonymityvi
dc.subjectIoTvi
dc.titleSecurity and Privacy in Wireless and Mobile Networksvi
dc.typeBookvi
Bộ sưu tập: Công nghệ Thông tin_TLNM_SACH

Các tập tin trong tài liệu này:
Tập tin Mô tả Kích thước Định dạng  
SA11069_SA11069_1. Security and Privacy in Wireless and Mobile Networks - cover.pdf
  Giới hạn truy cập
cover254.72 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_2. Security and Privacy in Wireless and Mobile Networks - copyright.pdf
  Giới hạn truy cập
copyright108.39 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_3. Security and Privacy in Wireless and Mobile Networks - Index.pdf
  Giới hạn truy cập
Index516.18 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_4. Security and Privacy in Wireless and Mobile Networks - About the Special Issue Editors.pdf
  Giới hạn truy cập
About the Special Issue Editors45.66 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_5.Security and Privacy in Wireless and Mobile Networks - Chap 1.pdf
  Giới hạn truy cập
Security and Privacy in Wireless and Mobile Networks562.62 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_6.Security and Privacy in Wireless and Mobile Networks - Chap 2.pdf
  Giới hạn truy cập
Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks †4.3 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_7.Security and Privacy in Wireless and Mobile Networks - Chap 3.pdf
  Giới hạn truy cập
A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs1.91 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_8.Security and Privacy in Wireless and Mobile Networks - Chap 4.pdf
  Giới hạn truy cập
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning1.88 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_9.Security and Privacy in Wireless and Mobile Networks - Chap 5.pdf
  Giới hạn truy cập
An Anonymous Offline RFID Grouping-Proof Protocol2.36 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_10.Security and Privacy in Wireless and Mobile Networks - Chap 6.pdf
  Giới hạn truy cập
Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications3.47 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_11.Security and Privacy in Wireless and Mobile Networks - Chap 7.pdf
  Giới hạn truy cập
Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems3.79 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_12.Security and Privacy in Wireless and Mobile Networks - Chap 8.pdf
  Giới hạn truy cập
Private and Secure Distribution of Targeted Advertisements to Mobile Phones1.13 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_13.Security and Privacy in Wireless and Mobile Networks - Chap 9.pdf
  Giới hạn truy cập
User Modelling Validation over the Security Awareness of Digital Natives2.54 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_14.Security and Privacy in Wireless and Mobile Networks - Chap 10.pdf
  Giới hạn truy cập
Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish871.62 kBAdobe PDFXem/Tải về  Yêu cầu tài liệu
SA11069_SA11069_Security_and_Privacy_in_Wireless_and_Mobile_Networks.pdf
  Giới hạn truy cập
Community, Culture and Gender between Italian and Turkish20.75 MBAdobe PDFXem/Tải về  Yêu cầu tài liệu


Khi sử dụng các tài liệu trong Thư viện số phải tuân thủ Luật bản quyền.