Fig. 2From: An artificial immunity approach to malware detection in a mobile platformSelf detector set generationBack to article page