Return to Article Details Detecting Unauthorized Access of Personal Device Download Download PDF