Research Article
An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing
Table 2
Classification of wireless security threats during business work using mobile devices.
| ||||||||||||||||||||||||||||||||||||||||||||||||
o: effect, —: no effect. |
| ||||||||||||||||||||||||||||||||||||||||||||||||
o: effect, —: no effect. |