Fig. 7From: A state-of-the-art survey of malware detection approaches using data mining techniquesThe total number of dataset used in each researchBack to article page