Login / Signup

Know your enemy: the risk of unauthorized access in smartphones by insiders.

Ildar MuslukhovYazan BoshmafCynthia KuoJonathan LesterKonstantin Beznosov
Published in: Mobile HCI (2013)
Keyphrases