1. Empirical assessment of the effort needed to attack programs protected with client/server code splitting;Alessio Viticchié;Empirical Software Engineering,2020
2. Avast. 2016. Malware posing as dual instance app steals users’ Twitter credentials. https://blog.avast.com/malware-posing-as-dual-instance-app-steals-users-twitter-credentials Accessed online: 2021/10/26 06:46:50. Avast. 2016. Malware posing as dual instance app steals users’ Twitter credentials. https://blog.avast.com/malware-posing-as-dual-instance-app-steals-users-twitter-credentials Accessed online: 2021/10/26 06:46:50.
3. BBC. 2017. Fake WhatsApp app downloaded more than one million times. https://www.bbc.com/news/technology-41886157 Accessed online: 2021/10/26 06:46:50. BBC. 2017. Fake WhatsApp app downloaded more than one million times. https://www.bbc.com/news/technology-41886157 Accessed online: 2021/10/26 06:46:50.