Advances in Information Security Series
()
About this series
First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Basedon this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware.
The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques.
Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
Titles in the series (3)
- Cyber Defense and Situational Awareness
62
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness – along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.
- Wireless Sensor Networks: Security, Coverage, and Localization
69
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
- Modern Data Strategy
70
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others. It defines data strategy, and covers chapters that illustrate how to align a data strategy with the business strategy, a discussion on valuing data as an asset, the evolution of data management, and who should oversee a data strategy. This provides the user with a good understanding of what a data strategy is and its limits. Critical to a data strategy is the incorporation of one or more data management domains. Chapters on key data management domains—data governance, data architecture, master data management and analytics, offer the user a practical approach to data management execution within a data strategy. The intent is to enable the user to identify how execution on one or more data management domains can help solve business issues. This book is intended for business users who work with data, who need to manage one or more aspects of the organization’s data, and who want to foster an integrated approach for how enterprise data is managed. This book is also an excellent reference for students studying computer science and business management or simply for someone who has been tasked with starting or improving existing data management.
Related to Advances in Information Security
Related ebooks
Ruth & Freddy #0 Rating: 0 out of 5 stars0 ratingsPolitical Power: Rush Limbaugh Rating: 0 out of 5 stars0 ratingsglobo arte october issue 2021 Rating: 0 out of 5 stars0 ratings10 Things You Should Know About Rating: 0 out of 5 stars0 ratingsMisadventures of Adam West #10: Volume 2 Rating: 0 out of 5 stars0 ratingsChildren's Ten Commandments Rating: 0 out of 5 stars0 ratingsColonial Comics: New England: 1620 - 1750 Rating: 4 out of 5 stars4/5Female Force: Gabrielle Giffords Rating: 0 out of 5 stars0 ratingsThe Accidental Warriors: The Accidental Warriors, #1 Rating: 0 out of 5 stars0 ratingsDollz #2 Rating: 0 out of 5 stars0 ratingsFAME: Lady Gaga: Giant-Sized Rating: 0 out of 5 stars0 ratingsFAME: Pop Stars #1 Rating: 0 out of 5 stars0 ratingsPolitical Power: Portrait Gallery Rating: 0 out of 5 stars0 ratingsVincent Price Presents: Volume #03 Rating: 0 out of 5 stars0 ratingsPolitical Power: Michele Bachmann Rating: 0 out of 5 stars0 ratingsMy Alabaster Box...: Poetry, Prose, and Prayer Rating: 0 out of 5 stars0 ratingsThe Man in the Mirror Journal: Everything Begins and Ends with You Rating: 0 out of 5 stars0 ratingsFleischer #1 Rating: 0 out of 5 stars0 ratingsPolitical Power: Ted Kennedy Rating: 0 out of 5 stars0 ratingsThe YaYa Books: A Trilogy, A Tribute In English and Spanish Rating: 0 out of 5 stars0 ratingsMy Sonoma - Valley of the Moon Rating: 0 out of 5 stars0 ratingsVincent Price Presents: Tinglers Rating: 0 out of 5 stars0 ratingsThe Adventures of Eli and Jake Rating: 0 out of 5 stars0 ratingsOrbit: Jack Kirby: Co-Creator of Captain America to X-Men Rating: 0 out of 5 stars0 ratingsThe GOD of Isreal (ISRAEL) and the Legend of The Christ: The LORD of Life, Light, & Love Rating: 0 out of 5 stars0 ratingsDelightful Questions for Children Rating: 0 out of 5 stars0 ratingsTails of Wisdom: Lessons I Learned from My Dogs Rating: 0 out of 5 stars0 ratingsPolitical Power: Joe Biden Rating: 4 out of 5 stars4/5Vincent Price Presents: Black & White #2 Rating: 0 out of 5 stars0 ratingsA Caboodle of Cat Tales Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsHow to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5
Related categories
Reviews for Advances in Information Security
0 ratings0 reviews