1. Gartner, 2015, http://www.gartner.com/newsroom/id/3010017.
2. NIST (National Institute of Standards and Technology), Guidelines for managing and securing mobile devices in the enterprise, 2012, http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf.
3. Per-user policy enforcement on mobile apps through network functions virtualization;Sapio,2014
4. Enterasys, Trends in BYOD:network management and security are leading concerns, 2013, http://blogs.enterasys.com/trends-in-byod-network-security-and-management-are-leading-concerns/.
5. ProfileDroid: multi-layer profiling of Android applications;Wei,2012