Fig. 3From: A state-of-the-art survey of malware detection approaches using data mining techniquesThe behavior-based malware detection frameworkBack to article page