This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.
Georgios Kambourakis, PhD, earned a diploma in applied informatics from the Athens University of Economics and Business and a PhD in information and communication systems engineering from the Department of Information and Communications Systems Engineering of the University of the Aegean. He also earned a Master of Education (EdM) from the Hellenic Open University. Currently, Georgios is an associate professor at the Department of Information and Communication Systems Engineering, University of the Aegean, Greece, and the director of Info-Sec-Lab. His research interests are in the fields of mobile and wireless networks security and privacy, VoIP security, public key infrastructure, DNS security, and security education and he has more than 110 refereed publications in the above areas. He has guest edited special issues of several journals, including ACM/Springer Mobile Networks and Applications, Computer Standards & Interfaces, IEEE Computer Magazine, Information Sciences, and Computer Communications. He has been involved in several national and EU funded R&D projects in the areas of Information and Communication Systems Security. He is a reviewer for a plethora of IEEE and other international journals and has served as a technical program committee member for more than 200 international conferences in security and networking. More info at www.icsd.aegean.gr/gkamb
Asaf Shabtai, PhD, is a senior lecturer (assistant professor) in the Department of Software and Information Systems Engineering at Ben-Gurion University (BGU) of the Negev. Asaf is also a senior researcher at the Telekom Innovation Laboratories at BGU. Asaf is an expert in information systems security and has led several large-scale projects and researches in this field. His main areas of interests are security of computer networks and smart mobile devices, malware detection, fraud detection and credit risk prediction, data leakage detection, analysis of encrypted traffic, security awareness, IoT security, development of security mechanisms for avionic systems, as well as the application of machine learning in the cyber security domain.He has published over 70 refereed papers in leading journals and conferences. In addition, he has coauthored a book on information leakage detection and prevention. He earned a BSc in mathematics and computer science (1998); a BSc in information systems engineering (1998); an MSc in information systems engineering (2003); and a PhD in information systems engineering (2011), all from Ben-Gurion University.
Constantinos Kolias, PhD, is a research assistant professor at the George Mason University, Virginia. He earned a diploma in computer science from the Technological Educational Institute of Athens, Greece. He also earned an MSc and PhD in information and communication system security, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. His primary research interests lie in the field of security for Internet of Things, next-generation wireless communication protocols, intrusion detection for wireless networks, and mobile surveillance.
Dimitrios Damopoulos, PhD, earned a BSc in industrial informatics from the Technological Educational Institute of Kavala, Greece. He also earned an MSc in information and communication systems security and a PhD in information and communication systems engineering, both from the Department of Information and Communication Systems Engineering, University of the Aegean, Greece. Currently, he is with Stevens Institute of Technology as an assistant professor. His research interests focus on smartphone security, mobile device intrusion detection and prevention systems, mobile malware, as well as mobile applications and services.
Mobile Platforms Security, Privacy, and Intrusion Detection: A Review of Intrusion Detection and Prevention on Mobile Devices: The Last Decade. Attacking Smartphone Security and Privacy. Reliable Ad Hoc Smartphone Application Creation for End Users. Android Applications Privacy Risk Assessment. From Fuzziness to Criminal Investigation: An Inference System for Mobile Forensics. Malware Detection in Mobile Platforms: Function-Based Malware Detection Technique for Android. Detecting Android Kernel Rootkits via JTAG Memory Introspection. Various Shades of Intrusion: An Analysis of Grayware, Adsware, Spyware and Other Borderline Android Apps. Data Leakage in Mobile Malware: The What, the Why, and the How. Mobile Network Security and Intrustion Detection: Analysis of Mobile Botnets Using a Hybrid Experimental Platform. Applying Low-cost Software Radio for Experimental Analysis of LTE Security, Protocol Exploits, and Location Leaks. A Comprehensive SMS-Based Intrusion Detection Framework. Intrusion Detection in Dynamic and Self-Organizing Networks: Intrusion Detection System in Self-Organizing Networks: A Survey. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. Intrusion Detection and Tolerance for 6LoWPAN-based WSNs Using MMT. Security Concerns in Co-operative Intelligent Transportation Systems.