1. Android-Developers. Android dev phones, http://developer.android.com/guide/developing/device.html (retrieved June 30, 2010)
2. Android Project. Android, http://www.android.com (retrieved June 30, 2010)
3. Andromaly Project. Andromaly anomaly detaction in android platform. http://andromaly.wordpress.com/ (retrieved June 30, 2010)
4. Becher, M., Hund, R.: Kernel-level interception and applications on windows mobile devices. Technical Report TR-2008-003, Department for Mathematics and Computer Science, University of Mannheim, Germany (2008)
5. Steel, R.C., Nagappan, R.: Core Security Patterns: Best Practices and Stategies for J2EE, Web Services, and Identity Management. Prentice Hall, Englewood Cliffs (2005)