Login / Signup
Using ontologies to perform threat analysis and develop defensive strategies for mobile security.
Ping Wang
Kuo-Ming Chao
Chi-Chun Lo
Yu-Shih Wang
Published in:
Inf. Technol. Manag. (2017)
Keyphrases
</>
databases
domain specific
mobile applications
knowledge representation
mobile phone
semantic web technologies
security issues
mobile devices
access control
statistical analysis
semantic web
wireless networks
mobile commerce