adamjanovsky / AndroidMalwareCrypto

The analysis of cryptography in Android malicious applications
MIT License
3 stars 0 forks source link

Feature normalization #28

Open dmacko232 opened 2 years ago

dmacko232 commented 2 years ago

Decide if normalizing by lines of code is not more appropriate than by count of classes. Do this by calculating correlation between the normalizing feature and count of crypto api records on Avast dataset.

dmacko232 commented 2 years ago

Note: do this with benign and malicious samples! Because using only one type could skew the results.