Research Article

On the Modelling of Context-Aware Security for Mobile Devices

Figure 4

Diagram depicting the subsequent steps of Algorithm 1.