Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Figure 4

The bipartite graph of adjacency nodes.