21
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

22
Published 2020
Springer Nature Singapore
Table of Contents: ...Computational Intelligence -- Cyber Security -- Computational Models...

23
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

24
Published 2018
John Wiley & Sons
Table of Contents: ... 3.2.5.4 5G Security Threat Analysis 69 3.3 Mobile Security Lifecycle Functions 70 3.3.1 Secure Device...

25 Subjects: ...Mobile computing / Security measures...

26
by Leirvik, Ryan
Published 2022
Apress
Table of Contents: ... -- Chapter 5: Manage the Problem -- Chapter 6: Get Ready for Measures -- Chapter 7: Measure the Problem...

27
by Leirvik, Ryan
Published 2023
Apress
Table of Contents: ... -- Chapter 5: Manage the Problem -- Chapter 6: Get Ready for Measures -- Chapter 7: Measure the Problem...

28
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Machine learning -- Software and systems security...

29
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Machine learning -- Software and systems security...

30
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Machine learning -- Software and systems security...

31
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Machine learning -- Software and systems security...

32
Published 2022
Springer International Publishing
Table of Contents: ...Blockchain Security -- A Blockchain-based Long-Term Time-Stamping Scheme -- Post-Quantum Verifiable...

33
by Zhang, Chuan, Wu, Tong, Li, Youqi, Zhu, Liehuang
Published 2023
Springer Nature Singapore
Table of Contents: ...Part I. Overview and Basic Concept of Mobile Crowdsensing Technology -- Chapter 1. Introduction...

34
Published 2020
Springer Nature Singapore
Table of Contents: ...Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile...

35
Published 2021
Springer International Publishing
Subjects: ...Computer networks / Security measures...

36
Published 2022
Springer Nature Switzerland
Table of Contents: ... Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique...

37
by Hagar, Jon Duncan
Published 2014
CRC Press
Table of Contents: ... and/or mobile phone attacks -- Mobile/embedded security -- Generic attacks -- Mobile and embedded system labs...

38
by Liu, Alex X., Li, Rui
Published 2021
Springer International Publishing
Table of Contents: ... and Keyword Query Processing over Encrypted Data with Provable Adaptive Security -- Nearest Neighbor Queries...

39
Published 2021
Springer International Publishing
Table of Contents: ... System for Mobile IoT Devices and Edge Computing --...

40
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Mobile computing / Security measures...