Fig. 3From: Accurate mobile malware detection and classification in the cloudThe confusion matrix of anomaly detectionBack to article page