Research Article
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
Table 6
The FPR of 30 typical malware families of the dataset.
| Family name | TPR/FPR (%) | Family name | TPR/FPR (%) | Family name | TPR/FPR (%) |
| DroidDream | 100/1.5 | RogueSPPush | 100/2 | Koodous | 100/0 | DroidDreamLight | 100/1 | SndApps | 100/2 | Mobidash | 100/2.2 | Geinimi | 100/1.4 | zHash | 100/0 | RansomBO | 100/0 | jSMSHider | 100/0 | Dowgin | 100/3.8 | Svpeng | 100/0 | Plankton | 100/1.3 | Edwin | 100/0 | Koler | 100/2.4 | YZHC | 100/0 | Feiwo | 100/0 | Pletor | 100/0 | Zsone | 100/0 | Gooligan | 100/2.5 | PornDroid | 100/2.3 | Asroot | 100/0 | Kemoge | 100/0 | Charger | 100/3.7 | Bgserv | 100/0 | Fakemart | 100/3 | Jisut | 100/0 | KMin | 100/0 | Jifake | 100/3.1 | MazarBot | 100/0 | Average | 1.1 | | | | |
|
|