Know your enemy: the risk of unauthorized access in smartphones by insiders. Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 271–280, 2013. bibtex @inproceedings{muslukhov2013know,
title={Know your enemy: the risk of unauthorized access in smartphones by insiders},
author={Muslukhov, Ildar and Boshmaf, Yazan and Kuo, Cynthia and Lester, Jonathan and Beznosov, Konstantin},
booktitle={Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services},
pages={271--280},
year={2013}
}
Downloads: 0
{"_id":"9Nf72NBjcfNpx4X5m","bibbaseid":"muslukhov-boshmaf-kuo-lester-beznosov-knowyourenemytheriskofunauthorizedaccessinsmartphonesbyinsiders-2013","author_short":["Muslukhov, I.","Boshmaf, Y.","Kuo, C.","Lester, J.","Beznosov, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Know your enemy: the risk of unauthorized access in smartphones by insiders","author":[{"propositions":[],"lastnames":["Muslukhov"],"firstnames":["Ildar"],"suffixes":[]},{"propositions":[],"lastnames":["Boshmaf"],"firstnames":["Yazan"],"suffixes":[]},{"propositions":[],"lastnames":["Kuo"],"firstnames":["Cynthia"],"suffixes":[]},{"propositions":[],"lastnames":["Lester"],"firstnames":["Jonathan"],"suffixes":[]},{"propositions":[],"lastnames":["Beznosov"],"firstnames":["Konstantin"],"suffixes":[]}],"booktitle":"Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services","pages":"271–280","year":"2013","bibtex":"@inproceedings{muslukhov2013know,\n title={Know your enemy: the risk of unauthorized access in smartphones by insiders},\n author={Muslukhov, Ildar and Boshmaf, Yazan and Kuo, Cynthia and Lester, Jonathan and Beznosov, Konstantin},\n booktitle={Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services},\n pages={271--280},\n year={2013}\n}\n\n","author_short":["Muslukhov, I.","Boshmaf, Y.","Kuo, C.","Lester, J.","Beznosov, K."],"key":"muslukhov2013know","id":"muslukhov2013know","bibbaseid":"muslukhov-boshmaf-kuo-lester-beznosov-knowyourenemytheriskofunauthorizedaccessinsmartphonesbyinsiders-2013","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/M8Cusi6NcZNqEmNN7","dataSources":["gdEygGa34uWkjynDQ","ikcgcNLWkPYd7asYj","WjyYKjDEeDNZ5D7kg","YAZ3EPKt9iuMHML8Y","Z66AwpjqbyDaCRuAz","vzLiYoozjbMtpq3bv","yyg88BndAbrgER4pG","qxYmJrWKptQFZpZn2","uXASf7FkwMkTdi7XQ","L3Q9QEq5gEyYsbhX8","PCm8nFZLWR38NRiRu","jagWcnNcoBLvejBcm","8cHa97bWQybuQhHDo","Kx35bmNmuB9SWebed","M5QirAZCjcxYLMFLM","BpNnApTKxApG4JxkD","BuaeMqxTDRXAZtmNe","r8QoBNxamnpCZ3Dwb"],"keywords":[],"search_terms":["know","enemy","risk","unauthorized","access","smartphones","insiders","muslukhov","boshmaf","kuo","lester","beznosov"],"title":"Know your enemy: the risk of unauthorized access in smartphones by insiders","year":2013}