Research Article
A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques
Table 2
Sensitive permissions and their
values.
| Sensitive permission (s) | (s, kā=ā1) |
| SEND_SMS | 0.243 | READ_PHONE_STATE | 0.239 | READ_CALL_LOG | 0.183 | RECEIVE_SMS | 0.182 | READ_EXTERNAL_STORAGE | 0.177 | READ_CONTACTS | 0.172 | RECEIVE_BOOT_COMPLETED | 0.171 | CALL_PHONE | 0.169 | INSTALL_PACKAGE | 0.167 | ACCESS_WIFI_STATE | 0.166 | WRITE_EXTRNAL_STORAGE | 0.165 | MOUNT_UNMOUNT_FILESYSTEMS | 0.165 | READ_SMS | 0.163 | ACCESS_NETWORK_STATE | 0.158 | PROCESS_OUTCALLS | 0.149 | CHANGE_WIFI_STATE | 0.148 | ACCESS_FINE_LOCATION | 0.144 | ACCESS_COARSE_LOCATION | 0.140 | INTERNET | 0.140 | WRITE_SETTING | 0.091 |
|
|