Fig. 4From: A state-of-the-art survey of malware detection approaches using data mining techniquesClassification methods in malware detection mechanismBack to article page