Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Table 3

Matrix of metrics.

 MalwareBenign

MalwareTPFN
BenignFPTN