Research Article

An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing

Table 3

Performance of single behavioral characteristic.

Behavioral characteristicAlgorithmTPFPPrecisionRecallF-measureROC area

CodeSVM0.6850.3180.6860.6850.6850.684
KNN0.6920.3240.6920.6920.6890.734
Random forest0.6940.3230.6940.6940.690.735
HardwareSVM0.5480.5350.5630.5480.4110.507
KNN0.5480.5340.5640.5480.4130.543
Random forest0.5480.5340.5640.5480.4130.547
IndentSVM0.6890.4890.7620.6890.7230.69
KNN0.8360.1840.8490.8360.8330.885
Random forest0.840.1810.8540.840.8370.892
Requested permissionSVM0.8730.1370.8760.8730.8720.868
KNN0.9360.0640.9360.9390.9360.972
Random forest0.9370.0630.9380.9370.9370.975
Suspicious APISVM0.7530.0.2570.7520.7530.7520.749
KNN0.7820.2280.7820.7820.7810.861
Random forest0.7790.2310.7790.7790.7770.861
Used permissionSVM0.8370.1770.8410.8370.8350.83
KNN0.8640.1380.8640.8640.8640.942
Random forest0.8670.1330.8670.8670.8670.943
APISVM0.8430.1250.8590.8430.8510.905
KNN0.8310.1340.8950.8310.8620.919
Random forest0.9040.0920.9160.9040.910.927
PayloadSVM0.5550.5310.7550.5550.4070.512
KNN0.6990.3130.6980.6990.6970.774
Random forest0.70.3110.6990.70.6980.779
CertSVM0.7440.3440.7960.7440.7690.8
KNN0.7640.3190.7580.7640.7610.786
Random forest0.8070.1830.8060.8070.8070.834
StringSVM0.7240.2690.7310.7240.7270.76
KNN0.5440.5440.5440.5440.5440.544
Random forest0.7630.320.7360.7620.7630.784
ComponentSVM0.8390.1640.840.8390.8390.851
KNN0.850.1920.8630.850.8560.872
Random forest0.8930.1170.8930.8470.870.875