Research Article

Malware Analysis Using Visualized Image Matrices

Figure 17

Results of similarity calculations using the three proposed techniques.
132713.fig.0017