Fig. 5From: An artificial immunity approach to malware detection in a mobile platformFeature vector creation with flowsBack to article page