Publisher
Springer Nature Singapore
Reference18 articles.
1. Acarali, D., Rajarajan, M.: Botnet-based attacks and defence mechanisms. In: Versatile Cybersecurity, pp. 169–199. Springer (2018)
2. Breitinger, F., Tully-Doyle, R., Hassenfeldt, C.: A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 88, 101647, ISSN: 0167-4048 (2020). https://doi.org/10.1016/j.cose.2019.101647
3. Breitinger, F., Nickel, C.: User survey on phone security and usage. BIOSIG, pp. 139–144 (2010)
4. Check Point Research: Vulnerability in Xiaomi Pre-Installed Security APP (2019). Available at: https://research.checkpoint.com/2019/vulnerability-in-xiaomi-pre-installed-security-app/. Accessed 10 March 2023
5. Chin, E., Fell, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: Proceedings of the Eight Symposium on Usable Privacy and Security, ser. SOUPS’ 1 2, pp. 1:1–1:16. ACM, NewYork, NY, USA (2012)