[1]
“Threats and Solutions to Mobile Devices”, UTJsci, vol. 5, no. 2, pp. 64–75, May 2015, doi: 10.32792/utq/utjsci/v5i2.117.