Research Article
[Retracted] Naive Bayes Algorithm Mining Mobile Phone Trojan Crime Clues
Table 3
Sample set feature library.
| Feature name | Self-starting | Hide | Visual interface | Inject into other processes | Reduce safety | Binding port | Kill other processes |
| Pcshare | 1 | 1 | 0 | 1 | 0 | 0 | 0 | NetThief | 1 | 1 | 0 | 0 | 1 | 1 | 0 | Spirit3 | 1 | 1 | 0 | 1 | 0 | 0 | 1 | NetSys | 1 | 1 | 0 | 1 | 0 | 1 | 0 | FeiMooMba | 1 | 1 | 0 | 0 | 1 | 0 | 1 | NewsunRCtrl | 1 | 1 | 0 | 0 | 1 | 1 | 0 | BlueButterfly | 1 | 1 | 0 | 1 | 0 | 1 | 1 |
|
|