Fig. 2From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceFeatures ranked by eigenvaluesBack to article page