These are the sources and citations used to research Current Research. This bibliography was generated on Cite This For Me on

  • Website

    It's been 9 years and Android still has a bad reputation when it comes to security

    2018

    In-text: (It's been 9 years and Android still has a bad reputation when it comes to security, 2018)

    Your Bibliography: Android Central. 2018. It's been 9 years and Android still has a bad reputation when it comes to security. [online] Available at: <https://www.androidcentral.com/its-been-9-years-and-android-still-has-bad-reputation-when-it-comes-security> [Accessed 2 May 2018].

  • Website

    Android – History

    2018

    In-text: (Android – History, 2018)

    Your Bibliography: Android. 2018. Android – History. [online] Available at: <https://www.android.com/history/> [Accessed 2 May 2018].

  • Website

    Distribution of Android operating systems used Android phone owners in February 2018, P. V.

    Android version market share 2018 | Statistic

    2018

    In-text: (Distribution of Android operating systems used Android phone owners in February 2018, 2018)

    Your Bibliography: Distribution of Android operating systems used Android phone owners in February 2018, p., 2018. Android version market share 2018 | Statistic. [online] Statista. Available at: <https://www.statista.com/statistics/271774/share-of-android-platforms-on-mobile-devices-with-android-os/> [Accessed 2 May 2018].

  • Journal

    Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. and Rajarajan, M.

    Android Security: A Survey of Issues, Malware Penetration, and Defenses

    2015 - IEEE Communications Surveys & Tutorials

    In-text: (Faruki et al., 2015)

    Your Bibliography: Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M., Conti, M. and Rajarajan, M., 2015. Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys & Tutorials, 17(2), pp.998-1022.

  • Website

    Data protection

    2018

    In-text: (Data protection, 2018)

    Your Bibliography: GOV.UK. 2018. Data protection. [online] Available at: <https://www.gov.uk/data-protection> [Accessed 2 May 2018].

  • Website

    Greenberg, A., Greenberg, A., Newman, L., Greenberg, A., Lapowsky, I., Graff, G., Newman, L. and Barrett, B.

    How a Bug in an Obscure Chip Exposed a Billion Smartphones to Hackers

    2018

    In-text: (Greenberg et al., 2018)

    Your Bibliography: Greenberg, A., Greenberg, A., Newman, L., Greenberg, A., Lapowsky, I., Graff, G., Newman, L. and Barrett, B., 2018. How a Bug in an Obscure Chip Exposed a Billion Smartphones to Hackers. [online] WIRED. Available at: <https://www.wired.com/story/broadpwn-wi-fi-vulnerability-ios-android/> [Accessed 2 May 2018].

  • Website

    Gruman, G.

    Why Android hasn't beaten Apple in business

    2018

    In-text: (Gruman, 2018)

    Your Bibliography: Gruman, G., 2018. Why Android hasn't beaten Apple in business. [online] InfoWorld. Available at: <https://www.infoworld.com/article/3066933/android/why-android-hasnt-beaten-apple-in-business.html> [Accessed 2 May 2018].

  • Journal

    Kanupriya, R.

    CONSUMER PREFERENCE TOWARDS MAJOR MOBILE OPERATING SYSTEMS

    2016 - Orbit-Biz-Dictum

    In-text: (Kanupriya, 2016)

    Your Bibliography: Kanupriya, R., 2016. CONSUMER PREFERENCE TOWARDS MAJOR MOBILE OPERATING SYSTEMS. Orbit-Biz-Dictum, 1(1), pp.28-42.

  • Journal

    Karthick, S. and Binu, S.

    Android security issues and solutions

    2017 - 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)

    In-text: (Karthick and Binu, 2017)

    Your Bibliography: Karthick, S. and Binu, S., 2017. Android security issues and solutions. 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA),.

  • Journal

    Tesfay, W. B., Booth, T. and Andersson, K.

    Reputation Based Security Model for Android Applications

    2012 - 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

    In-text: (Tesfay, Booth and Andersson, 2012)

    Your Bibliography: Tesfay, W., Booth, T. and Andersson, K., 2012. Reputation Based Security Model for Android Applications. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications,.

  • Journal

    Wu, L., Grace, M., Zhou, Y., Wu, C. and Jiang, X.

    The impact of vendor customizations on android security

    2013 - Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13

    In-text: (Wu et al., 2013)

    Your Bibliography: Wu, L., Grace, M., Zhou, Y., Wu, C. and Jiang, X., 2013. The impact of vendor customizations on android security. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13,.

  • Journal

    Xing, L., Pan, X., Wang, R., Yuan, K. and Wang, X.

    Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating

    2014 - 2014 IEEE Symposium on Security and Privacy

    In-text: (Xing et al., 2014)

    Your Bibliography: Xing, L., Pan, X., Wang, R., Yuan, K. and Wang, X., 2014. Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating. 2014 IEEE Symposium on Security and Privacy,.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join