1.
Król P, Marek D, Smołka J. Analysis of user behavior and authorization methods in context of mobile devices security . J. Comput. Sci. Inst. [Internet]. 2018 Mar. 30 [cited 2024 Dec. 26];6:34-41. Available from: https://ph.pollub.pl/index.php/jcsi/article/view/636