Fig. 3From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceOpcode density for pop and ret mapped into feature spaceBack to article page