P. Andriotis, G. Oikonomou, and T. Tryfonas, Forensic analysis of wireless networking evidence of Android smartphones, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.109-114, 2012.
DOI : 10.1109/WIFS.2012.6412634

P. Andriotis, G. Oikonomou, T. Tryfonas, and S. Li, Highlighting Relationships of a Smartphone???s Social Ecosystem in Potentially Large Investigations, IEEE Transactions on Cybernetics, vol.46, issue.9, 2016.
DOI : 10.1109/TCYB.2015.2454733

P. Andriotis, T. Tryfonas, G. Oikonomou, and I. King, A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM, Advances in Digital Forensics XI, pp.251-267, 2015.
DOI : 10.1007/978-3-319-24123-4_15

URL : https://hal.archives-ouvertes.fr/hal-01449062

R. Beede, D. Warbritton, and R. Han, MyShield: Protecting Mobile Device Data via Security Circles, 2012.

M. Benisch, P. Kelley, N. Sadeh, and L. Cranor, Capturing locationprivacy preferences: Quantifying accuracy and user-burden tradeoffs , Personal and Ubiquitous Computing, pp.679-694, 2011.
DOI : 10.1007/s00779-010-0346-0

URL : http://www.cs.cmu.edu/~sadeh/Publications/Small%20Selection/Capturing%20Location-Privacy%20Preferences%20Tech%20Report%20CMU-ISR-10-105.pdf

A. Beresford, A. Rice, N. Skehin, and R. Sohan, MockDroid, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, pp.49-54, 2011.
DOI : 10.1145/2184489.2184500

A. Bernheim-brush, J. Krumm, and J. Scott, Exploring end user preferences for location obfuscation, location-based services and the value of location, Proceedings of the Twelfth ACM International Conference on Ubiquitous Computing, pp.95-104, 2010.

D. Fisher, L. Dorner, and D. Wagner, Location privacy: User behavior in the field, Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.51-56, 2012.

M. Harris and K. Patten, Mobile device security considerations for small- and medium-sized enterprise business mobility, Information Management & Computer Security, vol.22, issue.1, pp.97-114, 2014.
DOI : 10.1108/09685229910371071

B. Henne, C. Kater, and M. Smith, On Usable Location Privacy for Android with Crowd-Recommendations, Proceedings of the Seventh International Conference on Trust and Trustworthy Computing, pp.74-82, 2014.
DOI : 10.1007/978-3-319-08593-7_5

B. Henne, C. Kater, M. Smith, and M. Brenner, Selective cloaking: Need-to-know for location-based apps, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.19-26, 2013.
DOI : 10.1109/PST.2013.6596032

P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011.
DOI : 10.1145/2046707.2046780

T. Kaiser and G. Removes, App Ops " privacy control feature from Android 4.4.2, DailyTech, 2013.

J. Lin, S. Amini, J. Hong, N. Sadeh, J. Lindqvist et al., Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.501-510, 2012.
DOI : 10.1145/2370216.2370290

K. Tang, J. Hong, and D. Siewiorek, The implications of offering more disclosure choices for social location sharing, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.391-394, 2012.
DOI : 10.1145/2207676.2207730

T. Vidas and N. Christin, Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014.
DOI : 10.1145/2590296.2590325

URL : http://dl.acm.org/ft_gateway.cfm?id=2590325&type=pdf