Vui lòng dùng định danh này để trích dẫn hoặc liên kết đến tài liệu này:
http://thuvienso.vanlanguni.edu.vn/handle/Vanlang_TV/33429
Toàn bộ biểu ghi siêu dữ liệu
Trường DC | Giá trị | Ngôn ngữ |
---|---|---|
dc.contributor.author | Kambourakis, Georgios | - |
dc.contributor.author | Gómez Mármol, Félix | - |
dc.contributor.author | Wang (Eds.), Guojun | - |
dc.date.accessioned | 2021-08-12T10:11:16Z | - |
dc.date.available | 2021-08-12T10:11:16Z | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 978-3-03842-779-7 | - |
dc.identifier.uri | http://thuvienso.vanlanguni.edu.vn/handle/Vanlang_TV/33429 | - |
dc.description | vi, 162 p. ; 20,2 Mb ; https://doi.org/10.3390/books978-3-03842-780-3 ; CC BY-NC-ND | vi |
dc.description.abstract | "Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed. To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges." | vi |
dc.description.tableofcontents | "About the Special Issue Editors ..................................... v Georgios Kambourakis, Felix Gomez Marmol and Guojun Wang Security and Privacy in Wireless and Mobile Networks doi: 10.3390/fi10020018 ......................................... 1 Wenjuan Li, Weizhi Meng and Lam For Kwok Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks † doi: 10.3390/fi10010006 ......................................... 4 Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs doi: 10.3390/fi10010001 ......................................... 20 Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning doi: 10.3390/fi9010007 ......................................... 37 Zhibin Zhou An Anonymous Offline RFID Grouping-Proof Protocol doi: 10.3390/fi10010002 ......................................... 52 Pierpaolo Loreti, Lorenzo Bracciale and Alberto Caponi Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications doi: 10.3390/fi10020013 ......................................... 67 Stylianos S. Mamais and George Theodorakopoulos Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems doi: 10.3390/fi9040088 ......................................... 84 Stylianos S. Mamais and George Theodorakopoulos Private and Secure Distribution of Targeted Advertisements to Mobile Phones doi: 10.3390/fi9020016 ......................................... 107 Vasileios Gkioulos, Gaute Wangen, Sokratis K. Katsikas User Modelling Validation over the Security Awareness of Digital Natives doi: 10.3390/fi9030032 ......................................... 128 Andrea Guazzini, Ay¸ca Sara¸c, Camillo Donati, Annalisa Nardi, Daniele Vilone and Patrizia Meringolo Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish doi: 10.3390/fi9020011 ......................................... 144" | vi |
dc.language.iso | en | vi |
dc.publisher | MDPI | vi |
dc.subject | Security | vi |
dc.subject | privacy | vi |
dc.subject | mobile | vi |
dc.subject | wireless | vi |
dc.subject | threat | vi |
dc.subject | attack | vi |
dc.subject | vulnerability | vi |
dc.subject | defense | vi |
dc.subject | intrusion | vi |
dc.subject | anonymity | vi |
dc.subject | IoT | vi |
dc.title | Security and Privacy in Wireless and Mobile Networks | vi |
dc.type | Book | vi |
Bộ sưu tập: | Công nghệ Thông tin_TLNM_SACH |
Các tập tin trong tài liệu này:
Khi sử dụng các tài liệu trong Thư viện số phải tuân thủ Luật bản quyền.