Research Article
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
Table 11
Information of the different sizes of applications.
| Label | Average number of nodes | Average number of edges |
| A | 180 | 340 | B | 550 | 1020 | C | 690 | 1800 | D | 1110 | 2800 | E | 1600 | 3730 | F | 2500 | 6800 | G | 2900 | 7000 | H | 4400 | 10300 | I | 5620 | 16030 | J | 8680 | 20700 |
|
|