Research Article
Behavior Intention Derivation of Android Malware Using Ontology Inference
Table 1
The rules of behavior semantic extraction.
| Program structure | Location of behavior semantic |
| Sequential relation | Extracting both of these APIs. | Prepared for the latter | Extracting the latter API. | Multilevel data access | Extracting the former API. |
|
|