1. Apple Inc., “iOS 10 - Apple (IN).” [Online]. Available: https://www.apple.com/in/ios/ios-10/. [Accessed: 10-Jun-2017].
2. “Apple App Store: number of available apps 2017 | Statistic.” [Online]. Available: https://www.statista.com/statistics/263795/number-of-available-apps-in-the-apple-app-store/. [Accessed: 10-Jun-2017].
3. Wei T, Zheng M, Xue H, Song D. “Apple without a shell – iOS under targeted attack,” no. September, pp. 1–6, 2014.
4. Lau B, Jang Y, Song C, and O.F. Technology, “MACTANS: Injecting malware into iOS devices via malicious chargers,” pp. 1–11, 2014.
5. Apple Inc., “Requesting permission - app architecture - iOS human interface guidelines.” [Online]. Available: https://developer.apple.com/ios/human-interface-guidelines/app-architecture/requesting-permission/. [Accessed: 16-Nov-2017].