[[1] Eric Filiol, Paul Irolla - (In)Security of Mobile Banking and of Other Mobile Apps, White Paper, Black Hat Asia 2015.]Search in Google Scholar
[[2] Robert Lipovsky, Lukas Stefanko, Gabriel Branisa, Trends in Android Ransomware, Whitepaper, ESET, 2017 https://www.welivesecurity.com/wp-content/uploads/2017/02/ESET_Trends_2017_in_Android_Ransomware.pdf.]Search in Google Scholar
[[3] Mobile Threat Landscape Report, Pradeo, 2018 -https://www.pradeo.com/media/mobile_threat_landscape_S12018.pdf.10.1016/S1361-3723(18)30050-2]Search in Google Scholar
[[4] Avast Threat Landscape Report: 2018 Predictions, Avast, 2018 -https://press.avast.com/hubfs/media-materials/kits/Avast-Threat-Landscape-Report-2018-Predictions/Avast-Threat-Landscape%20Report-2018%20Predictions.pdf?t=1517564995066.]Search in Google Scholar
[[5] Sachin Sharma, The Mobile Threats Lurking In Our Applications, VMware EUC Blog, March, 2018.]Search in Google Scholar
[[6] Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017–2022 White Paper - https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-738429.html.]Search in Google Scholar
[[7] Ponemon Institute – The State of Mobile Application Insecurity, 2017.]Search in Google Scholar