Research Article
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
Table 5
The confusion matrix for classification of 8 families (%).
| | ā | BB | AB | DK | GD | DDL | PJ | DD | PK | ZS |
| | BB | 98.4 | 1.6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | | AB | 3.2 | 96.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | | DK | 0 | 0 | 100 | 0 | 0 | 0 | 0 | 0 | 0 | | GD | 0 | 0 | 0 | 100 | 0 | 0 | 0 | 0 | 0 | | DDL | 0 | 0 | 0 | 0 | 100 | 0 | 0 | 0 | 0 | | PJ | 0 | 0 | 0 | 0 | 0 | 100 | 0 | 0 | 0 | | DD | 0 | 0 | 0 | 0 | 0 | 0 | 100 | 0 | 0 | | PK | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 100 | 0 | | ZS | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 100 |
|
|