Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
 Qi, Han, and Abdullah Gani. "Research on mobile cloud computing: Review, trend and perspectives." In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on, pp. 195-202. IEEE, 2012.
 Asokan, N. "Security issues in mobile computing." (1994).
 Urbas, Gregor, and Tony Krone. Mobile and wireless technologies: security and risk factors. Australian Institute of Criminology, 2006.
 Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. “Internet of Things (IoT): A vision, architectural elements, and future directions” Future generation computer systems 29, no. 7 (2013): 1645-1660.
 Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1, no. 1 (2014): 3-9.
 Yan-rong, Shi, and Hou Tao. "Internet of Things key technologies and architectures research in information Processing." In Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013). 2013.
 Yousuf, Tasneem, Rwan Mahmoud, Fadi Aloul, and Imran Zualkernan. "Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures." (2015).
 Kamilaris, Andreas, and Andreas Pitsillides. "Mobile phone computing and the Internet of Things: A survey." IEEE Internet of Things Journal 3, no. 6 (2016): 885-898.
 Adat, Vipindev, and B. B. Gupta. "Security in Internet of Things: issues, challenges, taxonomy, and architecture." Telecommunication Systems (2017): 1-19.
 Khattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RFID Security Threats and Basic Solutions." In RFID Security, pp. 27-41. Springer International Publishing, 2017.
 Desmedt, Yvo. "Man-in-the-middle attack." In Encyclopedia of cryptography and security, pp. 759-759. Springer US, 2011.
 Mirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. "Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)." (2004).
 Schwartz, Paul M. "Property, privacy, and personal data." Harv. L. Rev. 117 (2003): 2056.
 Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13, no. 18 (2013): 1587-1611.
 Yasham Singhal, Saloni Singh, Varsha Mathpal. Security Challenges in Mobile Computing. Vol 3, Issue1, Jan – March 2015.
 Wheat, Jeffrey, Randy Hiser, Jackie Tucker, Alicia Neely, and Andy McCullough. Designing a wireless network. Syngress Publishing, 2001.
 Ahonen, Pasi, Juhani Eronen, Jarkko Holappa, Jorma Kajava, Tiina Kaksonen, Kati Karjalainen, Kaarina Karppinen et al. "Information security threats and solutions in the mobile world." VTT Research Notes (2005): 1-108.
 Vermesan, Ovidiu, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert et al. "Internet of things strategic research roadmap." Internet of Things-Global Technological and Societal Trends 1 (2011): 9-52.
 Mendez, Diego M., Ioannis Papapanagiotou, and Baijian Yang. "Internet of Things: Survey on Security and Privacy." arXiv preprint arXiv: 1707.01879 (2017).