1. Nolan, G., 2012. Laying the groundwork. In Decompiling Android (pp. 1–17). Apress, Berkeley, CA.
2. Harrand, N., Soto-Valero, C., Monperrus, M. and Baudry, B., 2019. The Strengths and Behavioral Quirks of Java Bytecode Decompilers. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM) (pp. 92–102). IEEE.
3. V.D. AmbethKumar et al, (2015), “location monitoring system using android smart phones”, 2nd National Conference on “Innovations & Emerging Trends in Engineering and Technology (NCIETET-2015), 14th May 2015, at Panimalar Institute of Technology-600123, Chennai, India.
4. Miecznikowski, J. and Hendren, L., 2002, April. Decompiling Java bytecode: Problems, traps and pitfalls. In International Conference on Compiler Construction (pp. 111–127). Springer, Berlin, Heidelberg.
5. ProGuard, “Shrink, obfuscate, and optimize your app”, Android Studio, Accessed June. 10, 2020. [Online]. Available: https://developer.android.com/studio/build/shrink-code