Cited By
View all- Benton KCamp LGarg V(2013)Studying the effectiveness of android application permissions requests2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PerComW.2013.6529497(291-296)Online publication date: Mar-2013
- Borg ABoldt MCarlsson B(2011)Simulating Malicious Users in a Software Reputation SystemSecure and Trust Computing, Data Management and Applications10.1007/978-3-642-22339-6_18(147-156)Online publication date: 2011
- Rowe N(2009)The Ethics of Deception in CyberspaceHandbook of Research on Technoethics10.4018/978-1-60566-022-6.ch034(529-541)Online publication date: 2009
- Show More Cited By