Research Article
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
Table 8
Most used (percentage of occurrence) permissions and intents in the applications.
| Frequent permissions | Percentage | Frequently asked intents | Percentage (%) |
| Internet | 20 | Action.main | 28 | Read_phone_state | 15 | Category.launcher | 24 | Access_ network_state | 13 | Boot_completed | 14 | Write_external_storage | 7 | Category.default | 8 | Write_sms | 5 | Sms_received | 8 | Send_sms | 9 | Phone_state | 5 | Receive_boot_completed | 11 | Category_home | 4 | Wake_lock | 9 | New_outgoing_call | 3 | Access_fine_location | 6 | ACTION.VIEW | 3 | Access_coarse_location | 5 | Category.browsable | 3 |
|
|