Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Figure 1

The architecture of our method.