Research Article
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
Table 11
Information of the different sizes of applications.
| | Label | Average number of nodes | Average number of edges |
| | A | 180 | 340 | | B | 550 | 1020 | | C | 690 | 1800 | | D | 1110 | 2800 | | E | 1600 | 3730 | | F | 2500 | 6800 | | G | 2900 | 7000 | | H | 4400 | 10300 | | I | 5620 | 16030 | | J | 8680 | 20700 |
|
|