Research Article

On the Modelling of Context-Aware Security for Mobile Devices

Figure 5

Diagram depicting the subsequent steps of Algorithm 2.