Fig. 10From: Accurate mobile malware detection and classification in the cloudThe classification performance of three methodsBack to article page