Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Table 1

Edge-weighted matrix of .