Login / Signup
Techniques to detect data leakage in mobile applications.
Thiago S. Rocha
Eduardo Souto
Khalil El-Khatib
Published in:
Int. J. Secur. Networks (2019)
Keyphrases
</>
data analysis
mobile applications
database
data processing
data sets
data sources
sensor data
data collection
data points
information sources