Research Article

On-Device Detection of Repackaged Android Malware via Traffic Clustering

Figure 10

Example of the conversion of an encrypted flow to a feature vector.