Research Article

An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing

Figure 4

Comparison of the numeric aggregates of inward flow. (a) Number of received packets. (b) Average size of received packets.
(a)
(b)