Author:
Dong Yuzheng,Zhao Yanfeng,Wang Ziyue,He Juan,Zhu Liubin
Publisher
Springer International Publishing
Reference25 articles.
1. Mobile device security threats. http://searchmobilecomputing.techtarget.com/guides/Mobile-device-protection-and-security-threat-measures/
2. Zaidi, A.Z., Chong, C.Y., Jin, Z., Parthiban, R., Sadiq, A.S.: Touch-based continuous mobile device authentication: state-of-the-art, challenges and opportunities. J. Netw. Comput. Appl. 191(1), 103162 (2021)
3. Torbjørnsen, A., Ribu, L., Rønnevig, M.: Users’ acceptability of a mobile application for persons with type 2 diabetes: a qualitative study. BMC Health Serv. Res. 19(1), 641 (2019)
4. Jin, M., He, Y., Fang, D., Chen, X., Meng, X., Xing, T.: iGuard: a real-time anti-theft system for smartphones. IEEE Trans. Mob. Comput. 17(10), 2307–2320 (2018)
5. Zhang, Y., Hu, W., Xu, W., Chou, C.T., Hu, J.: Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 1(1), 1–15 (2018)