Gary Danks Gary Danks 13th Jun, 2018

This fraudulent app install hierarchy displays the family group (tier 1), the fraud category (tier 2), and the method used (tier 3) to generate the app install. 

For example, Attribution Fraud is the family group, Install Hijacking is the category and Malware is the method. 


Blog: Fraudulent App Install Hierarchy
Talk to Machine in confidence about a life without fraudulent installs