[1] Haris M, Jadoon B, Yousaf M, Khan FH. Evolution of android operating system: a review. Asia Pacific Journal of Contemporary Education and Communication Technology. 2018;4(1):178-88.
[2] Sharma T, Rattan D. Malicious application detection in android—a systematic literature review. Computer Science Review. 2021 May 1;40:100373.
[3] Garg S, Baliyan N. Comparative analysis of Android and iOS from security viewpoint. Computer Science Review. 2021 May 1;40:100372.
[4] Meng H, Thing VL, Cheng Y, Dai Z, Zhang L. A survey of Android exploits in the wild. Computers & Security. 2018 Jul 1;76:71-91.
[5] Choudhary SR, Gorla A, Orso A. Automated test input generation for android: Are we there yet?(e). In2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2015 Nov 9 (pp. 429-440). IEEE.
[6] Tewari A, Singh P. Android App Development: A Review. Journal of Management and Service Science (JMSS). 2021 Aug 8;1(2):1-6.
[7] Rana A. An overview of android operating system. ACADEMICIA: An International Multidisciplinary Research Journal. 2021;11(10):668-74.
[8] Hahm O, Baccelli E, Petersen H, Tsiftes N. Operating systems for low-end devices in the internet of things: a survey. IEEE Internet of Things Journal. 2015 Dec 4;3(5):720-34.
[9] Ayyasamy A. Survey on Android application advancement and security. In2015 Seventh International Conference on Advanced Computing (ICoAC) 2015 Dec 15 (pp. 1-4). IEEE.
[10] Corral L, Georgiev AB, Sillitti A, Succi G. A method for characterizing energy consumption in Android smartphones. In2013 2nd international workshop on green and sustainable software (GREENS) 2013 May 20 (pp. 38-45). IEEE.
[11] Andrus J, Nieh J. Teaching operating systems using android. InProceedings of the 43rd ACM technical symposium on Computer Science Education 2012 Feb 29 (pp. 613-618).
[12] Alani MM. Android Users Privacy Awareness Survey. International Journal of Interactive Mobile Technologies. 2017 Jul 1;11(3).
[13] Prajapati P, Bhagat D, Shah P. A review on different techniques used to detect the malicious applications for securing the android operating system. International Journal of Scientific & Technology Research. 2020;9:5255-8.
[14] Khan S, Yusuf A, Haider M, Thirunavukkarasu K, Nand P, Rahmani MK. A Review of Android and iOS Operating System Security. In2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS) 2022 Jun 22 (pp. 67-72). IEEE.
[15] Sk HK. A literature review on android mobile malware detection using machine learning techniques. In2022 6th international conference on computing methodologies and communication (ICCMC) 2022 Mar 29 (pp. 986-991). IEEE.
[16] Rashidi B, Fung CJ. A Survey of Android Security Threats and Defenses. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.. 2015 Sep;6(3):3-5.
[17] Zikria YB, Kim SW, Hahm O, Afzal MK, Aalsalem MY. Internet of Things (IoT) operating systems management: Opportunities, challenges, and solution. Sensors. 2019 Apr 15;19(8):1793.
[18] Barsiya TK, Gyanchandani M, Wadhwani R. Android malware analysis: a survey paper. International Journal of Control, Automation, Communication and Systems (IJCACS). 2016 Jan;1(1):35-42.