Fig. 8From: A state-of-the-art survey of malware detection approaches using data mining techniquesThe data analysis methods in the selected articlesBack to article page