Cited By
View all- LEE HLEE YSEO CYOON H(2018)Efficient Approach for Mitigating Mobile Phishing AttacksIEICE Transactions on Communications10.1587/transcom.2018EBP3020E101.B:9(1982-1996)Online publication date: 1-Sep-2018
- Davidson DChen YGeorge FLu LJha SKarri RSinanoglu OSadeghi AYi X(2017)Secure Integration of Web Content and Applications on Commodity Mobile Operating SystemsProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3052998(652-665)Online publication date: 2-Apr-2017
- Lombardi FDi Pietro R(2016)Trusted, Heterogeneous, and Autonomic Mobile CloudSecure System Design and Trustable Computing10.1007/978-3-319-14971-4_14(439-455)Online publication date: 2016
- Show More Cited By