...
[Chin 2011] Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner,
Analyzing Inter-Application Communication in Android,
Proc. MobiSys '11: Proceedings of the 9th international conference on Mobile systems, applications, and services, pp. 239-252, ACM, New York, NY, 2011.
...
[JSR-133 2004]
JSR-133: Java™ Memory Model and Thread Specification, 2004.
[JSSEC 2013]
Android Secure Design and Coding Guidebook, (in Japanese),Japan Smartphone Security Association, 2013.
...
[Lea 2000b] Doug Lea and William Pugh,
Correct and Efficient Synchronization of Java™ Technology based Threads, JavaOne Conference, 2000.
...
[Low 1997] Douglas Low,
Protecting Java Code via Obfuscation,
Crossroads Volume 4, Issue 3, 1997.
...
[Mahmoud 2002] Qusay H. Mahmoud,
Compressing and Decompressing Data Using Java APIs, Oracle, 2002. [Mak 2002] Ronald Mak,
Java Number Cruncher: The Java Programmer's Guide to Numerical Computing, Prentice Hall PTR, Upper Saddle River, NJ, 2002.
[Manson 2004] Jeremy Manson and Brian Goetz,
JSR 133 (Java Memory Model) FAQ, 2004.
[Manson 2006] Jeremy Manson and William Pugh,
The Java™ Memory Model: The Building Block of Concurrency, JavaOne Conference, 2006.
...
[Mocha 2007]
Mocha, the Java Decompiler, 2007.
[Monsch 2006] Jan P. Monsch,
Ruining Security with java.util.Random Version 1.0, 2006.
[MSDN 2009] Microsoft Corporation,
Using SQL Escape Sequences, 2009.
[Muchow 2001] John W. Muchow,
MIDlet Packaging with J2ME,ONJava.com, 2001.
...
[Pugh 2004] William Pugh,
The Java Memory Model (discussions reference), 2004.
[Pugh 2008] William Pugh,
Defective Java Code: Turning WTF Code into a Learning Experience, JavaOne Conference, 2008.
...