Cited By
View all- Primiero GSolheim FSpring J(2018)On Malfunction, Mechanisms and Malware ClassificationPhilosophy & Technology10.1007/s13347-018-0334-2Online publication date: 12-Nov-2018
- Doke PJoshi A(2015)Mobile Phone Usage by Low Literate UsersProceedings of the 7th Indian Conference on Human-Computer Interaction10.1145/2835966.2835968(10-18)Online publication date: 17-Dec-2015
- Türpe SFord RZurko MHerley CWhalen T(2012)Point-and-shoot security designProceedings of the 2012 New Security Paradigms Workshop10.1145/2413296.2413300(27-42)Online publication date: 18-Sep-2012