These are the sources and citations used to research Thesis. This bibliography was generated on Cite This For Me on
In-text: (Bojjagani and Sastry, 2017)
Your Bibliography: Bojjagani, S. and Sastry, V. (2017). VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp.77-86.
In-text: (Gorey, 2018)
Your Bibliography: Gorey, C. (2018). Limerick selected as case study for €500,000 smart city project. [online] Silicon Republic. Available at: https://www.siliconrepublic.com/machines/limerick-smart-city-study-lero [Accessed 17 Feb. 2018].
In-text: (Merzdovnik et al., 2016)
Your Bibliography: Merzdovnik, G., Buhov, D., Voyiatzis, A. and Weippl, E. (2016). Notary-Assisted Certificate Pinning for Improved Security of Android Apps. 2016 11th International Conference on Availability, Reliability and Security (ARES).
In-text: (Muhammad, 2013)
Your Bibliography: Muhammad, S. (2013). Applying authentication tests to discover Man-In-The-Middle attack in security protocols. Eighth International Conference on Digital Information Management (ICDIM 2013).
In-text: (Owasp.org, 2018)
Your Bibliography: Owasp.org. (2018). Mobile Top 10 2016-Top 10 - OWASP. [online] Available at: https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 [Accessed 20 Jan. 2018].
In-text: (Raul and Sevillano, 2017)
Your Bibliography: Raul, B. and Sevillano, A. (2017). Services cloud under HSTS, Strengths and weakness before an attack of man in the middle MITM. 2017 Congreso Internacional de Innovacion y Tendencias en Ingenieria (CONIITI).
In-text: (Zhao et al., 2013)
Your Bibliography: Zhao, Y., Lei, Y., Yang, T. and Cui, Y. (2013). A new strategy to defense against SSLStrip for Android. 2013 15th IEEE International Conference on Communication Technology.
10,587 students joined last month!