Return to Article Details Detecting Malicious Applications from the cloud by using user feedback method Download Download PDF