Fig. 4From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceEvaluation of the scalar D used in the cost functionBack to article page