Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Figure 2

The permissions of “6a0bfabcc1cce2a5424313b34ca967fbc8f98bea.apk.”