i-Shield: A System to Protect the Security of Your Smartphone.
Zhuolong YuLiusheng HuangHansong GuoHongli XuPublished in: KSEM (2016)
Keyphrases
- data encryption
- information security
- security requirements
- access control
- protection mechanisms
- intrusion detection
- computer security
- network security
- information assurance
- security management
- security issues
- mobile devices
- data protection
- security policies
- unauthorized access
- security threats
- security problems
- cyber security
- data mining
- encryption scheme
- statistical databases
- security level
- functional requirements
- sensitive data
- privacy protection
- biometric systems
- security vulnerabilities
- data sharing
- third party
- neural network