M. Barrère, G. Hurel, R. Badonnel, and O. Festor, A probabilistic cost-efficient approach for mobile security assessment, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013.
DOI : 10.1109/CNSM.2013.6727842

M. Barrère, G. Hurel, R. Badonnel, and O. Festor, Ovaldroid: An OVAL-based vulnerability assessment framework for Android, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM'13), pp.1074-1075, 2013.

R. Jin and B. Wang, Malware Detection for Mobile Devices Using Software-Defined Networking, 2013 Second GENI Research and Educational Experiment Workshop, pp.81-88, 2013.
DOI : 10.1109/GREE.2013.24

C. Kilinc, T. Booth, and K. Andersson, WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.877-883, 2012.
DOI : 10.1109/TrustCom.2012.298

T. Kim, Y. Choi, S. Han, J. Y. Chung, J. Hyun et al., Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure, Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium, pp.1303-1310, 2012.

Q. Li and G. Clark, Mobile Security: A Look Ahead, IEEE Security & Privacy, vol.11, issue.1, pp.78-81, 2013.
DOI : 10.1109/MSP.2013.15

J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, Virtualized in-cloud security services for mobile devices, Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt '08, pp.31-35, 2008.
DOI : 10.1145/1622103.1629656

N. Percoco and S. Schulte, Adventures in BouncerLand: Failures of Automated Malware Detection within Mobile Application Markets. -Black Hat USA 2012, p.2012

G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, Paranoid Android, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.347-356, 2010.
DOI : 10.1145/1920261.1920313

J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy et al., Making Middleboxes Someone else's Problem: Network Processing As a Cloud Service, Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.13-24, 2012.