Research Article

Toward Identifying APT Malware through API System Calls

Figure 15

Contrast experiment with Han et al.’s method.