Vetting the Security of Mobile Applications

2015 
Infrastructure protection/Computer networks; Technology/Telecommunication technology; Management and economics; Technology/Information technology; Terrorism and threats/Cyberterrorism
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    14
    References
    25
    Citations
    NaN
    KQI
    []