Research Article

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing

Table 8

Most used (percentage of occurrence) permissions and intents in the applications.

Frequent permissionsPercentageFrequently asked intentsPercentage (%)

Internet20Action.main28
Read_phone_state15Category.launcher24
Access_ network_state13Boot_completed14
Write_external_storage7Category.default8
Write_sms5Sms_received8
Send_sms9Phone_state5
Receive_boot_completed11Category_home4
Wake_lock9New_outgoing_call3
Access_fine_location6ACTION.VIEW3
Access_coarse_location5Category.browsable3