Research Article

A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques

Figure 8

Evaluation of the selected features. (a) Ex1: bigrams vs. unigrams of APIs. (b) Ex2: bigrams with vs. without contexts. (c) Ex3: permissions in different cases. (d) Ex4: with vs. without broadcast events.
(a)
(b)
(c)
(d)