Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Figure 5

The distribution of dataset D5.