The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences |
38th IEEE Symposium on Security and Privacy
|
Looking Inside the (Drop) Box |
WOOT '13
|
Strategies for prioritization of malicious URL re-evaluation |
VB2011 Barcelona
|