[1]
“Security Evaluation of IOS and Android”, J. Appl. Methods Electron. Comput., pp. 258–261, Dec. 2016, doi: 10.18100/ijamec.270378.