Figure 1From: Detecting unknown malicious code by applying classification techniques on OpCode patternsConverting byte representation into OpCode n -grams patterns.Back to article page