1. Ahmed W, Rasool A, Javed AR, Kumar N, Gadekallu TR, Jalil Z, Kryvinska N (2021) Security in next generation mobile payment systems: a comprehensive survey. IEEE Access
2. Alazab M, Tang M (2019) Deep learning applications for cyber security. Springer, Cham
3. Allix K, Jerome Q, Bissyande TF, Klein J, State R, Traon YL (2014) A Forensic Analysis of Android Malware. In: 38th Annual Computer Software and Applications Conference, IEEE, pp 384–393, 10.1109/COMPSAC.2014.61, http://ieeexplore.ieee.org/document/6899240/. Accessed 22 July 2022
4. Buildfire (2022) Ultimate mobile app stores list. https://www.android.com/intl/en_us/intl/en_uk/play-protect/, last checked on Jan 7, 2022
5. Cao M (2022) Understanding the characteristics of invasive malware from the google play store. PhD thesis, University of British Columbia