1. G. Delac, M. Silic, and J. Krolo - “Emerging Security Threats For Mobile Platforms,” In Proceedings of the 34th International Convention on Information and Communication Technology,
2. Opatija,Croatia-“SANDBOX,” - http://en.wikipedia.org/wiki/Sandbox (computer security)-In Electronics and Microelectronics (MIPRO ’11), pp. 1468–1473, May 2011.
3. G. Benats, A. Bandara, Y. Yu, J.-N. Colin, and B. Nuseibeh “Primandroid: Privacy Policy Modelling And Analysis for Android Applications,”-In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 129– 132, Pisa, Italy, June 2011.
4. Q. Ni, E. Bertino, J. Lobo, and S. B. Calo- “Privacy-aware role- based access control”-In IEEE Security & Privacy, vol. 7, no. 4, pp. 35–43, 2009
5. Archana Jadhav, "VNC Architecture Based Remote Desktop Access Through Android”-In International Journal of Advanced Research in Computer and Communication Engineering, May-2001