Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Figure 4

Matching time of the VF2 algorithm and FCGiso algorithm.
(a)
(b)