A Context-Based Personalization for Mobile Applications' Network Access
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[2] Marco Gruteser,et al. A Field Study of Run-Time Location Access Disclosures on Android Smartphones , 2014 .
[3] Lorrie Faith Cranor,et al. "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.
[4] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[5] E. Rosenbloom. A probabilistic interpretation of the final rankings in AHP , 1997 .
[6] N. Asokan,et al. Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[7] Elisa Bertino,et al. Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.
[8] Liang Gu,et al. Context-Aware Usage Control for Android , 2010, SecureComm.
[9] George D. Magoulas,et al. Context-Dependent Personalised Feedback Prioritisation in Exploratory Learning for Mathematical Generalisation , 2009, UMAP.
[10] Giuseppe F. Italiano,et al. SecureMyDroid: enforcing security in the mobile devices lifecycle , 2010, CSIIRW '10.
[11] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[12] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[13] Thomas L. Saaty,et al. Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World , 1982 .
[14] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[15] Hidetoshi Nonaka,et al. A Proposal of Context-Aware Service Composition Method Based on Analytic Hierarchy Process , 2009 .
[16] Yaser Mowafi,et al. A Context-aware Adaptive Security Framework for Mobile Applications , 2014, ICCASA.
[17] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[18] Paul Jen-Hwa Hu,et al. A Web-based personalized recommendation system for mobile phone selection: Design, implementation, and evaluation , 2010, Expert Syst. Appl..
[19] Denzil Ferreira,et al. Securacy: an empirical investigation of Android applications' network usage, privacy and security , 2015, WISEC.
[20] Gerhard Fischer,et al. Context-aware systems: the 'right' information, at the 'right' time, in the 'right' place, in the 'right' way, to the 'right' person , 2012, AVI.
[21] Songwu Lu,et al. Accounting for roaming users on mobile data access: issues and root causes , 2013, MobiSys '13.
[22] Ian Oakley,et al. CASA: context-aware scalable authentication , 2013, SOUPS.
[23] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[24] Ralph E. Steuer,et al. Multiple Criteria Decision Making, Multiattribute Utility Theory: The Next Ten Years , 1992 .