. Josang, Robustness of Trust and Reputation Systems: Does It Matter?, Proceedings of the 6th IFIPTM, pp.253-262, 2012.
DOI : 10.1007/978-3-642-29852-3_21

W. Meng, W. H. Lee, S. R. Murali, and S. P. Krishnan, Charging Me and I Know Your Secrets! Towards Juice Filming Attacks on Smartphones, Proceedings of ACM CPSS, pp.89-98, 2015.
DOI : 10.1016/j.jnca.2016.04.015

W. Meng, D. S. Wong, S. Furnell, and J. Zhou, Surveying the Development of Biometric User Authentication on Mobile Phones, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1268-1293, 2015.
DOI : 10.1109/COMST.2014.2386915

W. Meng, W. H. Lee, and S. P. Krishnan, A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks, The Singapore Cyber Security R&D Conference (SG-CRC), pp.99-106, 2016.

S. Peng, S. Yu, and A. Yang, Smartphone Malware and Its Propagation Modeling: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.925-941, 2014.
DOI : 10.1109/SURV.2013.070813.00214

P. Teufl, M. Ferk, A. Fitzek, D. Hein, S. Kraxberger et al., Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play), Security and Communication Networks, vol.44, issue.6, pp.389-419, 2016.
DOI : 10.1002/sec.675