Reassessing feature-based Android malware detection in a contemporary context
Table 28
Result comparison between Kandukuru and Sharma [39] and our reimplementation, showing the performance of ML models trained on dynamic network traffic features and static permissions.