Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

Figure 6

Flowchart of the system.
983901.fig.006