L. Liu, G. Yan, X. Zhang, and S. Chen, VirusMeter: Preventing Your Cellphone from Spies, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, 2009.
DOI : 10.1007/978-3-642-04342-0_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.2152

G. W. Chow and A. Jones, A framework for anomaly detection in OKL4-Linux based smartphones, Proceedings of the 6th Australian Information Security Management Conference, 2008.

M. Landesman, The world's largest security analysis of real-world web traffic: annual global threat report, ScanSafe STAT, 2009.

V. R. Pandya, iPhone Security Analysis, Journal of Information Security, vol.01, issue.02, 2008.
DOI : 10.4236/jis.2010.12009

URL : http://doi.org/10.4236/jis.2010.12009

A. Chavez, A jailbroken iPhone can be a very powerfull weapon in the hands of an attacker, 2008.

C. Miller and C. Mulliner, Fuzzing the Phone in your Phone, 2009.

A. Analysis and . The-ikee, B (Duh) iPhone botnet, 2010.