[1]
M. Buryta and P. Kopniak, “Comparison of the security mechanisms of popular operating systems for mobile devices ”, J. Comput. Sci. Inst., vol. 4, pp. 87–91, Sep. 2017.