Login / Signup
Shattered Trust: When Replacement Smartphone Components Attack.
Omer Shwartz
Amir Cohen
Asaf Shabtai
Yossi Oren
Published in:
CoRR (2018)
Keyphrases
</>
trust model
countermeasures
data mining
website
mobile devices
trust relationships
data sets
learning algorithm
case study
mobile applications
open systems