Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Figure 5

The execution time of our method on different sizes of applications.