Research Article
Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness
Table 1
Detection results using k-NN, SVM, and Logistic Regression Algorithms.
| Measure | -NN | Cosine -NN | Cubic -NN | Weighted -NN | Linear SVM | Quadratic SVM | Cubic SVM | Gauss SVM | LR |
| TPR | 0.876 | 0.907 | 0.839 | 0.917 | 0.990 | 0.980 | 0.980 | 0.853 | 0.990 | PPV | 0.99 | 0.98 | 0.99 | 0.99 | 0.99 | 0.99 | 0.99 | 0.99 | 0.99 | FNR | 0.124 | 0.093 | 0.161 | 0.083 | 0.010 | 0.020 | 0.020 | 0.147 | 0.010 | ACC | 0.925 | 0.940 | 0.900 | 0.950 | 0.990 | 0.985 | 0.985 | 0.910 | 0.990 | F1 | 0.930 | 0.942 | 0.908 | 0.952 | 0.990 | 0.985 | 0.985 | 0.917 | 0.990 |
|
|