W Han, J Xue, Y Wang, L Huang, Z Kong, L Mao - computers & security, 2019 - Elsevier
… Based on the dependency graphs of malware samples, the common behavior graph was
extracted and used to represent the behavioral features of a malware … the beginning position as …