Sign in

Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept.

Madihah Mohd SaudiFarida RidzuanNurlida BasirN. F. NabilaSakinah Ali PitchayIntan Nurfarahin Ahmad
Published in: UKSim (2015)
Keyphrases