Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Techniques to detect data leakage in mobile applications
Thiago Rocha; Eduardo Souto; Khalil El-Khatib
International Journal of Security and Networks (IJSN), 2019 Vol.14 No.3, pp.146 - 157
11 + 20 =

Thank you for your feedback.