Control Flow-based malware variant detection
can anyone please tell me how a program's corresponding control flow graph is converted to k-subgraph feature. Actually I want to know how the vector is derived from the k-subgraph.
Reference : Control Flow-based malware variant detection (IEEE July/August-2014)
Reference : Control Flow-based malware variant detection (IEEE July/August-2014)
0