Research Article
A Graph-Based Feature Generation Approach in Android Malware Detection with Machine Learning Techniques
Figure 8
Evaluation of the selected features. (a) Ex1: bigrams vs. unigrams of APIs. (b) Ex2: bigrams with vs. without contexts. (c) Ex3: permissions in different cases. (d) Ex4: with vs. without broadcast events.
(a) |
(b) |
(c) |
(d) |