Matches in SemOpenAlex for { <https://semopenalex.org/work/W22493313> ?p ?o ?g. }
Showing items 1 to 79 of
79
with 100 items per page.
- W22493313 abstract "Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices. * Visual PayloadsView attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and ThreatsUnderstand the history of major attacks and horizon for emerging threates. * Overview of Mobile Malware FamiliesIdentify and understand groups of mobile malicious code and their variations. * Taxonomy of Mobile MalwareBring order to known samples based on infection, distribution, and payload strategies. * Phishing, SMishing, and Vishing AttacksDetect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques. * Operating System and Device VulnerabilitiesAnalyze unique OS security issues and examine offensive mobile device threats. * Analyze Mobile MalwareDesign a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware. * Forensic Analysis of Mobile MalwareConduct forensic analysis of mobile devices and learn key differences in mobile forensics. * Debugging and Disassembling Mobile MalwareUse IDA and other tools to reverse-engineer samples of malicious code for analysis. * Mobile Malware Mitigation MeasuresQualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks * Analyze Mobile Device/Platform Vulnerabilities and Exploits * Mitigate Current and Future Mobile Malware Threats" @default.
- W22493313 created "2016-06-24" @default.
- W22493313 creator A5004130108 @default.
- W22493313 date "2009-01-01" @default.
- W22493313 modified "2023-09-26" @default.
- W22493313 title "Mobile Malware Attacks and Defense" @default.
- W22493313 doi "https://doi.org/10.1016/b978-1-59749-298-0.x0001-8" @default.
- W22493313 hasPublicationYear "2009" @default.
- W22493313 type Work @default.
- W22493313 sameAs 22493313 @default.
- W22493313 citedByCount "27" @default.
- W22493313 countsByYear W224933132012 @default.
- W22493313 countsByYear W224933132013 @default.
- W22493313 countsByYear W224933132014 @default.
- W22493313 countsByYear W224933132015 @default.
- W22493313 countsByYear W224933132016 @default.
- W22493313 countsByYear W224933132017 @default.
- W22493313 countsByYear W224933132018 @default.
- W22493313 countsByYear W224933132019 @default.
- W22493313 countsByYear W224933132021 @default.
- W22493313 crossrefType "book" @default.
- W22493313 hasAuthorship W22493313A5004130108 @default.
- W22493313 hasConcept C108827166 @default.
- W22493313 hasConcept C110875604 @default.
- W22493313 hasConcept C111919701 @default.
- W22493313 hasConcept C136764020 @default.
- W22493313 hasConcept C144543869 @default.
- W22493313 hasConcept C167900197 @default.
- W22493313 hasConcept C186967261 @default.
- W22493313 hasConcept C2777421447 @default.
- W22493313 hasConcept C2780967490 @default.
- W22493313 hasConcept C38652104 @default.
- W22493313 hasConcept C41008148 @default.
- W22493313 hasConcept C541664917 @default.
- W22493313 hasConcept C60952562 @default.
- W22493313 hasConcept C83860907 @default.
- W22493313 hasConcept C84525096 @default.
- W22493313 hasConceptScore W22493313C108827166 @default.
- W22493313 hasConceptScore W22493313C110875604 @default.
- W22493313 hasConceptScore W22493313C111919701 @default.
- W22493313 hasConceptScore W22493313C136764020 @default.
- W22493313 hasConceptScore W22493313C144543869 @default.
- W22493313 hasConceptScore W22493313C167900197 @default.
- W22493313 hasConceptScore W22493313C186967261 @default.
- W22493313 hasConceptScore W22493313C2777421447 @default.
- W22493313 hasConceptScore W22493313C2780967490 @default.
- W22493313 hasConceptScore W22493313C38652104 @default.
- W22493313 hasConceptScore W22493313C41008148 @default.
- W22493313 hasConceptScore W22493313C541664917 @default.
- W22493313 hasConceptScore W22493313C60952562 @default.
- W22493313 hasConceptScore W22493313C83860907 @default.
- W22493313 hasConceptScore W22493313C84525096 @default.
- W22493313 hasLocation W224933131 @default.
- W22493313 hasOpenAccess W22493313 @default.
- W22493313 hasPrimaryLocation W224933131 @default.
- W22493313 hasRelatedWork W1659147496 @default.
- W22493313 hasRelatedWork W1763578379 @default.
- W22493313 hasRelatedWork W1976837922 @default.
- W22493313 hasRelatedWork W2024735650 @default.
- W22493313 hasRelatedWork W2029755229 @default.
- W22493313 hasRelatedWork W2086401659 @default.
- W22493313 hasRelatedWork W2089735638 @default.
- W22493313 hasRelatedWork W2097988300 @default.
- W22493313 hasRelatedWork W2125011234 @default.
- W22493313 hasRelatedWork W2142145056 @default.
- W22493313 hasRelatedWork W2162035299 @default.
- W22493313 hasRelatedWork W2183350201 @default.
- W22493313 hasRelatedWork W2183615818 @default.
- W22493313 hasRelatedWork W2187462765 @default.
- W22493313 hasRelatedWork W2363725487 @default.
- W22493313 hasRelatedWork W2568201117 @default.
- W22493313 hasRelatedWork W2911429478 @default.
- W22493313 hasRelatedWork W2922526186 @default.
- W22493313 hasRelatedWork W3037366031 @default.
- W22493313 hasRelatedWork W2181494682 @default.
- W22493313 isParatext "false" @default.
- W22493313 isRetracted "false" @default.
- W22493313 magId "22493313" @default.
- W22493313 workType "book" @default.