共 11 条
- [1] [Anonymous], 2011, USENIX SECURITY S
- [2] [Anonymous], 2015, 2016 INT SEC THREAT
- [3] [Anonymous], 2016, COMPUTERWEEKLY 0504
- [4] [Anonymous], 2016, PHON THEFT AM
- [5] Ben-Asher N., P 13 INT C HUMAN COM, P465, DOI DOI 10.1145/2037373.2037442
- [6] Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
- [7] A Survey on Security for Mobile Devices [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 446 - 471
- [8] Mylonas A, 2011, SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P25
- [10] A Security Configuration Assessment for Android Devices [J]. 30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 2299 - 2304