Research Article

[Retracted] Naive Bayes Algorithm Mining Mobile Phone Trojan Crime Clues

Figure 5

Data encryption transmission process.