共 50 条
- [3] Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 57 - 62
- [4] Control of Our Personal Data in the Big Data Era: The Case of Third Party Web Tracking REVISTA ESTUDIOS SOCIO-JURIDICOS, 2019, 21 (01): : 209 - 244
- [6] Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code 2018 IEEE 22ND INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2018), 2018, : 208 - 211
- [7] Leakage of Sensitive Information to Third-Party Voice Applications PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
- [8] AppMonitor: restricting information leakage to third-party applications Social Network Analysis and Mining, 2020, 10
- [10] Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2021, : 116 - 126