Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Figure 6

Matching time of GED method.
(a)
(b)