作者: Timothy Strazzere , Matthew John Joseph LaMantia , Daniel Lee Evans , Emil Barker Ong , Brian James Buck
DOI:
关键词: Software 、 Computer security 、 Security assessment 、 Action (philosophy) 、 World Wide Web 、 Engineering
摘要: Software applications to be installed on user devices are monitored. Authenticity of the is evaluated using a plurality inputs provide result. The may include trust factors. factors used generate security evaluation. In response result, an action performed such as providing notification developer fraudulent version application or assessment for application.