View All Book Series


Security, Privacy, and Trust in Mobile Communications

About the Series

Similar to computers, mobile landscape is also facing various security and privacy related threats. Increasing demand of sophisticated handheld mobile devices including smartphones, tablets, and so forth, is making them an attractive target of security threats. Since these devices store confidential data of the end users, and exploitation of vulnerabilities of the underlying technologies can create a havoc on massive scale, it becomes inevitable to need to understand and address the threats associated with them and to analyze the level of trust that can be established for mobile communication scenarios.

This series will present emerging aspects of the mobile communication landscape, and focuses on the security, privacy, and trust issues in mobile communication based applications. It brings state-of-the-art subject matter for dealing with the issues associated with mobile and wireless networks. This series is targeted for researchers, students, academicians, and business professions in the field.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

5 Series Titles

Per Page

Intelligent Mobile Malware Detection

Intelligent Mobile Malware Detection

1st Edition

By Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
December 30, 2022

The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from...

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security

1st Edition

Edited By Arun Kumar Singh, Balwinder Raj
November 01, 2021

Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this ...

Cross-Site Scripting Attacks Classification, Attack, and Countermeasures

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures

1st Edition

By Brij B. Gupta, Pooja Chaudhary
March 05, 2020

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, ...

Smart Card Security Applications, Attacks, and Countermeasures

Smart Card Security: Applications, Attacks, and Countermeasures

1st Edition

By Brij B. Gupta, Megha Quamara
August 27, 2019

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks ...

Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Edited By Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of ...

AJAX loader