has been cited by the following article(s):
[1]
|
Understanding the asymmetric perceptions of smartphone security from security feature perspective: A comparative study
Telematics and Informatics,
2021
DOI:10.1016/j.tele.2020.101535
|
|
|
[2]
|
Mobile Malware Classification for Social Media Application
2019 International Conference on Cybersecurity (ICoCSec),
2019
DOI:10.1109/ICoCSec47621.2019.8970800
|
|
|
[3]
|
Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
IEEE Access,
2018
DOI:10.1109/ACCESS.2018.2826225
|
|
|
[4]
|
The Kano Model Analysis of Features for Mobile Security Applications
Computers & Security,
2018
DOI:10.1016/j.cose.2018.07.008
|
|
|
[5]
|
ScreenStealer: Addressing Screenshot attacks on Android devices
2016 22nd International Conference on Automation and Computing (ICAC),
2016
DOI:10.1109/IConAC.2016.7604942
|
|
|