The Perils of Android Security Configuration.
Daniel VecchiatoMarco VieiraEliane MartinsPublished in: Computer (2016)
Keyphrases
- malware detection
- information security
- security issues
- intrusion detection
- mobile devices
- security requirements
- network security
- security systems
- security measures
- information assurance
- statistical databases
- access control
- functional requirements
- security policies
- data security
- security problems
- biometric systems
- key management
- neural network
- network configuration
- security vulnerabilities