Fig. 7From: Detecting obfuscated malware using reduced opcode set and optimised runtime traceBreakdown of malware detection by opcode categoryBack to article page