Research Article
On-Device Detection of Repackaged Android Malware via Traffic Clustering
Figure 4
Possible deployments of the edge. The edge could be the wireless gateways or the dedicated servers that are connected to the eNodeB or the routers. (a) Wireless gateway. (b) eNodeB + server. (c) Router + server.
(a) |
(b) |
(c) |