Security and Communication Networks / 2019 / Article / Tab 5

Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Table 5

Experimental results comparisons.

DatasetNGED ≤ 0.05NGED ≤ 0.1NGED ≤ 0.2Our method
TPR (%)FPR (%)TPR (%)FPR (%)TPR (%)FPR (%)TPR (%)FPR (%)


We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.