Research Article

Malware Analysis Using Visualized Image Matrices

Figure 13

Comparison of image matrices with and without major block selection.
132713.fig.0013a
(a) Email-Worm.Win32.Klez.a
132713.fig.0013b
(b) Trojan-DDos.Win32.Boxed.a
132713.fig.0013c
(c) Trojan-Downloader.Win32.Lemmy.e
132713.fig.0013d
(d) Virus.Win32.HLLP.Zepp.a