Login / Signup
Know your enemy: the risk of unauthorized access in smartphones by insiders.
Ildar Muslukhov
Yazan Boshmaf
Cynthia Kuo
Jonathan Lester
Konstantin Beznosov
Published in:
Mobile HCI (2013)
Keyphrases
</>
unauthorized access
access control
intrusion detection system
security policies
sensitive data
file system
mobile devices
security vulnerabilities
risk management
desktop computers
data mining
intrusion detection
data model
digital libraries
network security
web services
machine learning
databases