1. Back S. LaPrade J. Shehadeh L. andKim M.(2019).Youth hackers and adult hackers in South Korea: an application of cybercriminal profiling.2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Stockholm Sweden(17–19 June 2019) pp.410–413. doi:https://doi.org/10.1109/EuroSPW.2019.00052.
2. Detection of app collusion potential using logic programming;Blasco J.;Journal of Network and Computer Applications,2018
3. Chung J. Gulcehre C. Cho K. andBengio Y.(2014).Empirical evaluation of gated recurrent neural networks on sequence modeling. InNIPS 2014 Workshop on Deep Learning December 2014 arXiv preprint arXiv:1412.3555.
4. Cimpanu C.(2015).100 million android users may have a backdoor on their device thanks to the Baidu SDK.http://news.softpedia.com/news/100‐million‐android‐users‐mayhave‐a‐backdoor‐on‐their‐device‐thanks‐to‐the‐baidu‐sdk‐495673.shtml(accessed 17 January 2019).
5. Cimpanu C.(2016).21 android apps spotted using app collusion attacks.http://news.softpedia.com/news/21‐android‐appsspotted‐using‐app‐collusion‐attacks‐505252.shtml(accessed 17 January 2019).