Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Algorithm 1

Edge-weighted matrix generation.
Input: Bipartite graph of adjacency nodes and the weight of all adjacency nodes.
Repeat:
  Choose and ,
  if ( or is not a virtual node)
   if ()
   Calculate the weight of edge:
   
   Insert into the edge-weighted matrix
  else
    = 0
   Insert into the edge-weighted matrix
Until: Every edge is assigned a weight.
Output: The edge-weighted matrix.