Research Article

Detection and Visualization of Android Malware Behavior

Figure 3

Schema used for the dendrograms.