1Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38.
2Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945.
3Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009 ;7 (1) :53-54.
4Shin W, Kwak S, Kiyomoto S, et al. A small but non-negligible flaw in the Android permission scheme. IEEE International Symposium on Policies for Distributed Systems and Net-works, 2010:109-110.
5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly : a behavioral mal- ware detection framework for android devices. Intelligent Information Systems, 2011:7-22.
6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto ma- licious behavior in mobile devices: knowledge-based approach. RAID, 2009.
7Shabtai A, Kanonov U, Elovici Y. Intrusion Detection on mobile de- vices using the knowledge based temporal-abstraction method. Sys- tems and Software, 2010 ;83 (8) : 1527-1536.
8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for in- ferring computer and network security alerts from timestamped, raw system metrics. Computer Virology, 2009 ; 8 ( 3 ) : 267-298.
9Shabtai A, Fledel Y, Elovici Y. Securing Android-powered mobile de- vices using SELinux. IEEE Security & Privacy,2010:36-44.