Login / Signup
An empirical performance and security evaluation of android container solutions.
Tianhui Meng
Zhihao Shang
Katinka Wolter
Published in:
Cyber Security (2017)
Keyphrases
</>
information security
optimal solution
mobile devices
security threats
neural network
security issues
evaluation method
intrusion detection
information retrieval
access control
simulated annealing
multi objective
evaluation criteria
evaluation model
security requirements
malware detection
database
security patterns