1. Adobe blogs. http://blogs.adobe.com/psirt?s=android.
2. A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors;Alessandro,2013
3. Intrusion detection systems (IDS) taxonomy – a short review;Amer;Def Cyber Secur,2010
4. APG application. http://www.thialfihar.org/projects/apg/.
5. Behavioral detection of malware on mobile handsets;Bose,2008