Using Network Security and Identity Management to Empower CISOs Today: The Case For A Comprehensive Enterprise Security Policy
F-Secure Mobile Threat Report, Q2 2012
Avtest 2012 02-android_anti-malware_report_english
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
G DATA Mobile Malware Threat Report Q1/2015
Android malware analysis