1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018, URL 〈http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf〉, 2013.
2. Juniper Networks Mobile Threat Center. Third Annual Mobile Threat Report: March 2012 to March 2013, URL 〈http://www.juniper.net/us/en/local/pdf/additional-resources/3rd-jnpr-mobile-threats-report-exec-summary.pdf〉, 2013.
3. Cisco 2014 Annual Security Report, URL 〈http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf〉, 2014.
4. A.P. Felt, E. Chin, S. Hanna, D. Song, D. Wagner, Android permissions demystified, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2011, pp. 627–638.
5. W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2009, pp. 235–245.