Research Article
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
Table 8
The computational performance.
| Procedures | Time |
| Constrained flow clustering (Algorithm 1) | 3 min | App identification (Algorithm 2) | 5.2 min | Network behavior profile construction | 1.7 min | Peer group analysis | 45 sec |
|
|