Login / Signup
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones.
Diogo Marques
Tiago João Guerreiro
Luís Carriço
Ivan Beschastnikh
Konstantin Beznosov
Published in:
CHI (2019)
Keyphrases
</>
unauthorized access
security vulnerabilities
access control
intrusion detection system
mobile devices
security policies
data sets
data processing
intrusion detection
databases
database systems
feature space
e government
multi dimensional
sensitive data