Skip to main content

Advances, Systems and Applications

Table 11 CC of our proposed approach

From: A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization

Algorithms

APK

JDEX/DEX

Extractor

TTF/TF/Dt/CF/DF

CFG/ACG

BL/ML

Algorithm 1

2|n|

\(|R|+|.d|+|M|\)

|n|

−

−

−

Algorithm 2

−

−

−

|n|

|n|

−

Algorithm 3

−

−

−

3|n|

−

−

Algorithm 4

−

−

−

\(5|n|+|\frac{n}{4}|\)

−

\(6|BL|+2|ML|\)