Skip to Content
Big Data
book

Big Data

by Fei Hu
April 2016
Beginner to intermediate
463 pages
18h 53m
English
Auerbach Publications
Content preview from Big Data
412
Big Data: Storage, Sharing, and Security
malicious applications requested a total of 14,758 permissions, which are more than benign
applications that requested 4,470 permissions. Another important behavior is that some of
the permissions are only requested by the benign applications and not by the malicious
ones, and vice versa. Furthermore, common permissions and unique permissions are also
analyzed.
However, Table 17.2 lists the top 20 used permissions for benign and malicious applications.
In the table, it can be seen that there is a small difference in which 16 out of 20 popular used
permissions are common in both datasets. Now there is a
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Big Data

Big Data

Bernard Marr
Big Data

Big Data

Kuan-Ching Li, Hai Jiang, Laurence T. Yang, Alfredo Cuzzocrea
Big Data

Big Data

Eglantine Schmitt
Big Data

Big Data

James Warren, Nathan Marz

Publisher Resources

ISBN: 9781498734875