Research Article

Dominant Feature Selection and Machine Learning-Based Hybrid Approach to Analyze Android Ransomware

Figure 6

Use of permissions.