A system for detection of abnormal behavior in BYOD based on web usage patterns
暂无分享,去创建一个
[1] Manpreet Singh,et al. Formal Specification of Common Criteria Based Access Control Policy Model , 2010, Int. J. Netw. Secur..
[2] Manpreet Singh,et al. A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment , 2009 .
[3] Jeffrey M. Voas,et al. BYOD: Security and Privacy Considerations , 2012, IT Professional.
[4] Dongho Won,et al. Security Requirements of a Mobile Device Management System , 2012 .
[5] Dimitris Gritzalis,et al. Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.