Reassessing feature-based Android malware detection in a contemporary context
Table 7
Result comparison between Ma et al. [22] and our reimplementation, comparing the four different API call modelling approaches used in the original study.
Click through the PLOS taxonomy to find articles in your field.
For more information about PLOS Subject Areas, click here.
Result comparison between Ma et al. [22] and our reimplementation, comparing the four different API call modelling approaches used in the original study.