Refrences

Au, M. H., & Choo, R. (2016). Mobile security and privacy : Advances, challenges and future research directions. ProQuest Ebook Central

https://ebookcentral.proquest.com

B. Chung, Y. Kim and K. Kim, “Just-on-Time Data Leakage Protection for Mobile Devices,” 2008 10th International Conference on Advanced Communication Technology, 2008, pp. 1914-1915, doi: 10.1109/ICACT.2008.4494160.

Fausset, R., & Blinder, A. (2018, December 12). After Possible Data Leak, North Carolina Edges Closer to Do-Over on Election. New York Times, A21(L). https://link.gale.com/apps/doc/A565334969/UHIC?u=cuny_nytc&sid=UHIC&xid=671add57

Georgia Tech discovers how mobile ads leak personal data. (2016). In Marketing Weekly News (p. 156–). NewsRX LLC.

Kim, Y., Oh, T., & Kim, J. (2015). Analyzing User Awareness of Privacy Data Leak in Mobile Applications. Mobile Information Systems, 2015, 1–12. https://doi.org/10.1155/2015/369489

Techopedia. (2014, September 30). What is a data encryption key (dek)? – definition from Techopedia. Retrieved May 04, 2021, from https://www.techopedia.com/definition/5660/data-encryption-key-dek

Vacca, J. R. (2013). Computer and information security handbook. ProQuest Ebook Central https://ebookcentral.proquest.com

Wang, F., Jiang, D., Wen, H., & Song, H. (2019). Adaboost-based security level classification of mobile intelligent terminals. Journal of Supercomputing, 75(11), 7460–7478. https://doi-org.citytech.ezproxy.cuny.edu/10.1007/s11227-019-02954-y

Weichbroth, P., & Łysik, Ł. (2020, December 7). Mobile Security: Threats and Best Practices. Mobile Information Systems. https://www.hindawi.com/journals/misy/2020/8828078/.

Yu, X., Tian, Z., Qiu, J., & Jiang, F. (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Wireless Communications and Mobile Computing, 2018. https://link.gale.com/apps/doc/A602364565/AONE?u=cuny_nytc&sid=AONE&xid=b3988c44