1. Desai, S. (2020). TikTok Spyware, A detailed analysis of spyware masquerading as TikTok. https://www.zscaler.com/blogs/security-research/tiktok-spyware
2. Shishkova, T., & Pikman, L. (2018). The Rotexy mobile Trojan – banker and ransomware. https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/
3. Lashkari, A. H., Kadir, A. F., Taheri, L., & Ghorbani, A. A. (2018). Toward developing a systematic approach to generate benchmark Android malware datasets and classification. In 2018 International Carnahan Conference on Security Technology (ICCST) (pp. 1–7).
4. Lookout, M. (2019). The Mobile Surveillance Tooling of the Special Technology Center, Security research report. https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf
5. Yuan, Z., Lu, Y., & Xue, Y. (2016). Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Science and Technology, 21(1), 114–123.