1. Anandajayam, P., Kumar, D.A.: Preferences extraction and ranking functions in mobile search. In: 2014 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5, 27–28 February 2014
2. Zhang, P., Kumabe,; Yuichi Kogure, A., Akutagawa, M., Kinouchi, Y., Zhang, Q.: New functions developed for ICU/CCU remote monitoring system using a 3G mobile phone and evaluations of the system. In: 2008 Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, pp. 5342–5345, 20–25 August 2008
3. Hancox, G., Richardson, J., Morris, A.: Drivers’ willingness to engage with their mobile phone: the influence of phone function and road demand. Intell. Transp. Syst. IET 7(2), 215–222 (2013)
4. Mikhaylov, D.M., Starikovskiy, A.V., Zuykov, A.V., Froimson, M.I., Smirnov, A.S., Sychev, N.V., Boruchinkin, A.Y., Fesenko, S.D.: Mathematical models of threats of unauthorized access to sensitive information of mobile network subscribers and measures to protect mobile system. J. Theor. Appl. Inf. Technol. 78(1), 1–8 (2015)
5. Mikhaylov, D., Starikovskiy, A., Lebedev, G., Uleykin, E., Dmitry, R., Alexey, E., Alexander, B., Anastasia, T.: Developing a system for text-messages protection. In: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russia, pp. 326–329, 8–10 September 2015