Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Table 11

Information of the different sizes of applications.

LabelAverage number of nodesAverage number of edges

A180340
B5501020
C6901800
D11102800
E16003730
F25006800
G29007000
H440010300
I562016030
J868020700