Login / Signup

Techniques to detect data leakage in mobile applications.

Thiago S. RochaEduardo SoutoKhalil El-Khatib
Published in: Int. J. Secur. Networks (2019)
Keyphrases
  • data analysis
  • mobile applications
  • database
  • data processing
  • data sets
  • data sources
  • sensor data
  • data collection
  • data points
  • information sources