Fig. 6From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceDetection accuracy and FN versus number of featuresBack to article page