Research Article
The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform
Table 4
Database table structure used in the processing module.
| Table name | Column name | Data type | NULL constraint | Primary key |
| IDSDB | ID | INTEGER | NOT NULL | PK | PackageName | VARCHAR | NOT NULL | PK | RiskType | Integer | NOT NULL | | Comment | VARCHAR | | |
|
|