Login / Signup
Protection profile for the smartphone operating system.
Jun Sang
Daxiang Hong
Bing Zhang
Hong Xiang
Li Fu
Published in:
Int. J. Embed. Syst. (2014)
Keyphrases
</>
operating system
protection scheme
previously mentioned
computer systems
virtual machine
distributed systems
microsoft windows
linux kernel
mobile devices
memory management
virtual memory
windows xp
operating environment
command line
databases
protection schemes
privacy protection
red hat