These are the sources and citations used to research Thesis. This bibliography was generated on Cite This For Me on

  • Journal

    Bojjagani, S. and Sastry, V.

    VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps

    2017 - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)

    In-text: (Bojjagani and Sastry, 2017)

    Your Bibliography: Bojjagani, S. and Sastry, V. (2017). VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp.77-86.

  • Website

    Gorey, C.

    Limerick selected as case study for €500,000 smart city project

    2018 - Silicon Republic

    In-text: (Gorey, 2018)

    Your Bibliography: Gorey, C. (2018). Limerick selected as case study for €500,000 smart city project. [online] Silicon Republic. Available at: https://www.siliconrepublic.com/machines/limerick-smart-city-study-lero [Accessed 17 Feb. 2018].

  • Journal

    Merzdovnik, G., Buhov, D., Voyiatzis, A. G. and Weippl, E. R.

    Notary-Assisted Certificate Pinning for Improved Security of Android Apps

    2016 - 2016 11th International Conference on Availability, Reliability and Security (ARES)

    In-text: (Merzdovnik et al., 2016)

    Your Bibliography: Merzdovnik, G., Buhov, D., Voyiatzis, A. and Weippl, E. (2016). Notary-Assisted Certificate Pinning for Improved Security of Android Apps. 2016 11th International Conference on Availability, Reliability and Security (ARES).

  • Journal

    Muhammad, S.

    Applying authentication tests to discover Man-In-The-Middle attack in security protocols

    2013 - Eighth International Conference on Digital Information Management (ICDIM 2013)

    In-text: (Muhammad, 2013)

    Your Bibliography: Muhammad, S. (2013). Applying authentication tests to discover Man-In-The-Middle attack in security protocols. Eighth International Conference on Digital Information Management (ICDIM 2013).

  • Website

    Mobile Top 10 2016-Top 10 - OWASP

    2018

    In-text: (Owasp.org, 2018)

    Your Bibliography: Owasp.org. (2018). Mobile Top 10 2016-Top 10 - OWASP. [online] Available at: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 [Accessed 20 Jan. 2018].

  • Journal

    Raul, B. G. and Sevillano, A. M. L.

    Services cloud under HSTS, Strengths and weakness before an attack of man in the middle MITM

    2017 - 2017 Congreso Internacional de Innovacion y Tendencias en Ingenieria (CONIITI)

    In-text: (Raul and Sevillano, 2017)

    Your Bibliography: Raul, B. and Sevillano, A. (2017). Services cloud under HSTS, Strengths and weakness before an attack of man in the middle MITM. 2017 Congreso Internacional de Innovacion y Tendencias en Ingenieria (CONIITI).

  • Journal

    Zhao, Y., Lei, Y., Yang, T. and Cui, Y.

    A new strategy to defense against SSLStrip for Android

    2013 - 2013 15th IEEE International Conference on Communication Technology

    In-text: (Zhao et al., 2013)

    Your Bibliography: Zhao, Y., Lei, Y., Yang, T. and Cui, Y. (2013). A new strategy to defense against SSLStrip for Android. 2013 15th IEEE International Conference on Communication Technology.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join