Reassessing feature-based Android malware detection in a contemporary context
Table 25
Result comparison between Zulkifli et al. [37] and our reimplementation, showing the performance of ML models trained using their TCP-based network traffic feature set.