Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers.
Luca CasatiAndrea ViscontiPublished in: IMIS (2017)
Keyphrases
- data sets
- training data
- user defined
- statistical analysis
- end users
- database
- high quality
- raw data
- sensor data
- data collection
- data structure
- data sources
- image data
- information systems
- user input
- spatial data
- missing data
- synthetic data
- data processing
- knowledge discovery
- recommender systems
- user interface
- data analysis