These are the sources and citations used to research Thesis. This bibliography was generated on Cite This For Me on

  • Website

    Mobile Top 10 2016-Top 10 - OWASP

    2018

    In-text: (Owasp.org, 2018)

    Your Bibliography: Owasp.org. (2018). Mobile Top 10 2016-Top 10 - OWASP. [online] Available at: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 [Accessed 20 Jan. 2018].

  • Journal

    Zhao, Y., Lei, Y., Yang, T. and Cui, Y.

    A new strategy to defense against SSLStrip for Android

    2013 - 2013 15th IEEE International Conference on Communication Technology

    In-text: (Zhao et al., 2013)

    Your Bibliography: Zhao, Y., Lei, Y., Yang, T. and Cui, Y. (2013). A new strategy to defense against SSLStrip for Android. 2013 15th IEEE International Conference on Communication Technology.

  • Journal

    Merzdovnik, G., Buhov, D., Voyiatzis, A. G. and Weippl, E. R.

    Notary-Assisted Certificate Pinning for Improved Security of Android Apps

    2016 - 2016 11th International Conference on Availability, Reliability and Security (ARES)

    In-text: (Merzdovnik et al., 2016)

    Your Bibliography: Merzdovnik, G., Buhov, D., Voyiatzis, A. and Weippl, E. (2016). Notary-Assisted Certificate Pinning for Improved Security of Android Apps. 2016 11th International Conference on Availability, Reliability and Security (ARES).

  • Journal

    Muhammad, S.

    Applying authentication tests to discover Man-In-The-Middle attack in security protocols

    2013 - Eighth International Conference on Digital Information Management (ICDIM 2013)

    In-text: (Muhammad, 2013)

    Your Bibliography: Muhammad, S. (2013). Applying authentication tests to discover Man-In-The-Middle attack in security protocols. Eighth International Conference on Digital Information Management (ICDIM 2013).

  • Journal

    Raul, B. G. and Sevillano, A. M. L.

    Services cloud under HSTS, Strengths and weakness before an attack of man in the middle MITM

    2017 - 2017 Congreso Internacional de Innovacion y Tendencias en Ingenieria (CONIITI)

    In-text: (Raul and Sevillano, 2017)

    Your Bibliography: Raul, B. and Sevillano, A. (2017). Services cloud under HSTS, Strengths and weakness before an attack of man in the middle MITM. 2017 Congreso Internacional de Innovacion y Tendencias en Ingenieria (CONIITI).

  • Journal

    Bojjagani, S. and Sastry, V.

    VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps

    2017 - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)

    In-text: (Bojjagani and Sastry, 2017)

    Your Bibliography: Bojjagani, S. and Sastry, V. (2017). VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp.77-86.

  • Website

    Gorey, C.

    Limerick selected as case study for €500,000 smart city project

    2018 - Silicon Republic

    In-text: (Gorey, 2018)

    Your Bibliography: Gorey, C. (2018). Limerick selected as case study for €500,000 smart city project. [online] Silicon Republic. Available at: https://www.siliconrepublic.com/machines/limerick-smart-city-study-lero [Accessed 17 Feb. 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join