Academic Press, 2017. — 248 p. — (Intelligent Data-Centric Systems). — ISBN: 978-0-12-804603-6.
This book explores the latest advancements in producing, processing and securing mobile data sets. The book provides the elements needed to deepen understanding of this trend which, over the last decade, has seen exponential growth in the number and capabilities of mobile devices. The pervasiveness, sensing capabilities and computational power of mobile devices have turned them into a fundamental instrument in everyday life for a large part of the human population. This fact makes mobile devices an incredibly rich source of data about the dynamics of human behavior, a pervasive wireless sensors network with substantial computational power and an extremely appealing target for a new generation of threats.
Offers a coherent and realistic image of today’s architectures, techniques, protocols, components, orchestration, choreography and development related to mobile computing.
Explains state-of-the-art technological solutions for the main issues hindering the development of next-generation pervasive systems including: supporting components for collecting data intelligently, handling resource and data management, accounting for fault tolerance, security, monitoring and control, addressing the relation with the Internet of Things and Big Data and depicting applications for pervasive context-aware processing.
Presents the benefits of mobile computing and the development process of scientific and commercial applications and platforms to support them.
Familiarizes readers with the concepts and technologies that are successfully used in the implementation of pervasive/ubiquitous systems.
Generating Mobile DataCloud Services for Smart City ApplicationsA Short Overview on Intelligent Transportation Systems.
MobiWay—Middleware Connection Hub for ITS Services.
An Open-Source ITS Mobile App.
The MobiWay Platform.
Web Services for ITS Support.
Evaluation Results.
Conclusions.
Environment Sensors Measures Processing: Integrating Real-Time and Spreadsheet-Based Data AnalysisEnvironment Sensors Measure Processing: Exploiting Data Analytics for Adaptive Real-Time Data Processing.
OSCi Framework Based IoT Engine for Real-Time Data Collection and Data Mashup.
Spreadsheet Space Layer; Spreadsheet-Based Data Sharing and Collaborative Analytics.
A Field Test Experiment: Deploying the Platform in a Real Case Scenario.
Conclusions.
Fusion of Heterogeneous Mobile Data, Challenges, and SolutionsIntroduciion.
Opportunities: Application Examples.
Challenges.
Solutions.
Conclusions.
Long-Range Passive Doppler-Only Target Tracking by Single-Hydrophone Underwater Sensors with MobilityBackground and Problem Definition.
Target-Tracking Approaches.
Simulation Results.
Conclusions and Future Works.
Processing Mobile DataAn Online Algorithm for Online Fraud Detection: Definition and TestingFraud Detection Algorithm for Dnline Banking.
Sample Features and Data Preprocessing.
Classifier Architecture.
Simple Classifiers.
Two Layers Assignment.
Classification Flow.
Empirical Assessment of Metaelassifier Performance.
Cross-Validation.
Sensitivity Analysis.
Funher Performance Tests.
Brief Introduction to Adaboost.
Brief Introduction to SVM.
Introducing Ubiquity in Noninvasive Measurement: Systems for Agile ProcessesResults.
Conclusions.
Constraint-Aware Data Analysis on Mobile Devices: An Application to Human Activity Recognition on SmartphonesConstraint-Aware Data Analysis.
Application to HAR on Smartphones.
Conclusions.
Securing Mobile DataHow on Earth Could That Happen? An Analytical Study on Selected Mobile Data BreachesAttack Motivations and Incentives.
Breaches by the Numbers.
Recent Mobile Data breaches.
Mobile Data Breaches: Insights.
Recommendations.
Conclusions.
Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile DataInformation Hiding and Mobile Devices.
Covert Channels Targeting Mobile Devices: A Review.
Detecting Covert Channels and Preventing Information Hiding in Mobile Devices.
Experimental Results.
Conclusions.
Exploring Mobile Data Security with Energy AwarenessMobile Data Security Threats and Countermeasures.
Mobile Security Management.
Mobile &ata Security with Energy Awareness.
Future Trends and Conclusion.
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile AppsRelated Work.
Overview of the Architecture.
MAVeriC Integration.
Case Studies.
Conclusions.