Research Article
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing
Figure 3
Comparison of the numeric aggregates of transfer size. (a) Number of packets. (b) Number of bytes.
(a) |
(b) |