1. 2014. Permission-based method. http://infosec.bjtu.edu.cn/wangwei/?page_id=85/ 2014. Permission-based method. http://infosec.bjtu.edu.cn/wangwei/?page_id=85/
2. 2017. MaMaDroid. https://bitbucket.org/gianluca_students/mamadroid_code/ 2017. MaMaDroid. https://bitbucket.org/gianluca_students/mamadroid_code/
3. 2018. Cyber attacks on Android devices on the rise. https://www.gdatasoftware.com/blog/2018/11/31255-cyber-attacks-on-android-devices-on-the-rise/ 2018. Cyber attacks on Android devices on the rise. https://www.gdatasoftware.com/blog/2018/11/31255-cyber-attacks-on-android-devices-on-the-rise/
4. 2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. https://www.gartner.com/en/newsroom/press-releases/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter/ 2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. https://www.gartner.com/en/newsroom/press-releases/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter/