“…The paper discussed the state of the art of this kind of problems, described the process, and showed some results in order to prove the effectiveness of the proposed method simulating a real scenario [25]. The article presented in [13] overviewed security issues and proposed a set of methods on how to avoid such issues in converged web and mobile based applications. The paper addressed security in mobile web-based applications, it gave a brief but good study of the major pitfalls and threats in converged web and mobile applications [26].…”