Research Article

On-Device Detection of Repackaged Android Malware via Traffic Clustering

Figure 4

Possible deployments of the edge. The edge could be the wireless gateways or the dedicated servers that are connected to the eNodeB or the routers. (a) Wireless gateway. (b) eNodeB + server. (c) Router + server.
(a)
(b)
(c)