Research Article
Android Malware Characterization Using Metadata and Machine Learning Techniques
Table 2
Dataset overview. Date of collection: 2015.
| Dataset element | Dataset Figures |
| Number of Applications | | Applications flagged as malware | | Number of Single-detection applications | | Number of Developers | | Number of Certificate Issuers | | Number of different permissions | | Number of intrinsic features | | Number of social-related features | | Number of reputation features | |
|
|