Research Article
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
Table 5
The confusion matrix for classification of 8 families (%).
| ā | BB | AB | DK | GD | DDL | PJ | DD | PK | ZS |
| BB | 98.4 | 1.6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | AB | 3.2 | 96.8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | DK | 0 | 0 | 100 | 0 | 0 | 0 | 0 | 0 | 0 | GD | 0 | 0 | 0 | 100 | 0 | 0 | 0 | 0 | 0 | DDL | 0 | 0 | 0 | 0 | 100 | 0 | 0 | 0 | 0 | PJ | 0 | 0 | 0 | 0 | 0 | 100 | 0 | 0 | 0 | DD | 0 | 0 | 0 | 0 | 0 | 0 | 100 | 0 | 0 | PK | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 100 | 0 | ZS | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 100 |
|
|