A Secure Mobile App Solution Using Human Behavioral Context and Analytic Hierarchy Process
暂无分享,去创建一个
[1] Hyerim Bae,et al. Analytic hierarchy process to assess and optimize distribution network , 2008, Appl. Math. Comput..
[2] Trent Jaeger,et al. Protecting the integrity of trusted applications in mobile phone systems , 2011, Secur. Commun. Networks.
[3] Dharma P. Agrawal,et al. GPS: Location-Tracking Technology , 2002, Computer.
[4] Dermot Barnes-Holmes,et al. Relational frame theory and Skinner’s Verbal Behavior: A possible synthesis , 2000, The Behavior analyst.
[5] A. L. Neve,et al. Adaptive Security Policy Using User Behavior Analysis and Human Elements of Information Security , 2012 .
[6] Ryosuke Shibasaki,et al. Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data , 2010, HBU.
[7] Albert-László Barabási,et al. Limits of Predictability in Human Mobility , 2010, Science.
[8] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[9] Julian Fiérrez,et al. Combining Biometric Evidence for Person Authentication , 2003, Advanced Studies in Biometrics.
[10] Noraini Che Pa,et al. Open source software selection using an analytical hierarchy process (AHP) , 2014 .
[11] Trent Jaeger,et al. Toward Automated Information-Flow Integrity Verification for Security-Critical Applications , 2006, NDSS.
[12] Zhipeng Liu,et al. A Large-Scale Study of Web Password Habits of Chinese Network Users , 2014, J. Softw..