*4.2. Experimental Environments*

The platform used to detect intrusion in Android applications is presented in Table 4.

**Table 4.** Environment requirements of the proposed model.

