A defense model against mobile phone malicious codes based on social computing
Crossref DOI link: https://doi.org/10.1007/s11859-017-1226-5
Published Online: 2017-03-11
Published Print: 2017-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Shi, Leyi
Liu, Xiaotong
Wang, Yao
License valid from 2017-03-11