Fig. 5From: A state-of-the-art survey of malware detection approaches using data mining techniquesAccuracy factor for selected approaches in malware detectionBack to article page