[1]
Król, P. et al. 2018. Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute. 6, (Mar. 2018), 34–41. DOI:https://doi.org/10.35784/jcsi.636.