Skip to main content
. 2021 Mar 19;26(3):36. doi: 10.1007/s10664-020-09934-4

Fig. 12.

Fig. 12

Timeline inspection of apps’ permission access pattern (dangerous permissions only): top five privacy-invasive permission access patterns