Fig. 1From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceExperiment overviewBack to article page