1. Android under siege: Popularity comes at a price (2012). Available: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-3q-2012-security-roundup-android-under-siege-popularity-comes-at-a-price.pdf
2. H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, Structural detection of android malware using embedded call graphs, in Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, ser. AISec ’13. New York, NY, USA: ACM, 2013, pp. 45–54. Available: http://doi.acm.org/10.1145/2517312.2517315
3. M. H. Daniel Arp, Michael Spreitzenbarth, K. R. Hugo Gascon, Drebin: Efficient and explainable detection of android malware in your pocket, in Proceedings of 17th Network and Distributed System Security Symposium (NDSS), 2014
4. V. B. de Oliveira, Honeypotlabsac: Um framework de honeypot virtual para o android, Master’s thesis, PPGEE/UFMA, June 2012
5. T. J. O’Connor, B. Sangster, honeym: A framework for implementing virtual honeyclients for mobile devices, in Proceedings of the Third ACM Conference on Wireless Network Security, ser. WiSec ’10. New York, NY, USA: ACM, 2010, pp. 129–138. Available: http://doi.acm.org/10.1145/1741866.1741888