{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:47:52Z","timestamp":1770814072480,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032163417","type":"print"},{"value":"9783032163424","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16342-4_5","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:20Z","timestamp":1770800300000},"page":"79-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-view Contrastive Graph Neural Network Framework for\u00a0Malware Detection in\u00a0IoMT Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7789-4382","authenticated-orcid":false,"given":"Bhagyasri","family":"Bora","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8575-614X","authenticated-orcid":false,"given":"Saunav","family":"Barman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4868-4450","authenticated-orcid":false,"given":"Rahul","family":"Bardhan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1717-2153","authenticated-orcid":false,"given":"Dharitri","family":"Brahma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-7307","authenticated-orcid":false,"given":"Amitava","family":"Nag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"15234","DOI":"10.1109\/ACCESS.2024.3397783","volume":"12","author":"M Abbasi","year":"2024","unstructured":"Abbasi, M., Shahraki, A., Taherkordi, A.: Dimensionality reduction with deep learning for botnet detection in IoT. IEEE Access 12, 15234\u201315247 (2024)","journal-title":"IEEE Access"},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020)","journal-title":"Simul. Model. Pract. Theory"},{"key":"5_CR3","volume":"234","author":"AF Alrefaei","year":"2024","unstructured":"Alrefaei, A.F., Ilyas, M.: Real-time intrusion detection for IoT devices using machine learning. Comput. Netw. 234, 109912 (2024)","journal-title":"Comput. Netw."},{"issue":"8","key":"5_CR4","first-page":"6153","volume":"26","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: IoT intrusion detection taxonomy, reference architecture, and open challenges. Wireless Netw. 26(8), 6153\u20136181 (2020)","journal-title":"Wireless Netw."},{"key":"5_CR5","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.comnet.2019.02.013","volume":"153","author":"F Alsubaei","year":"2019","unstructured":"Alsubaei, F., Abuhussein, A., Shiva, S.: Internet of medical things security: a review. Comput. Netw. 153, 86\u2013105 (2019)","journal-title":"Comput. Netw."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Areia, J., Bispo, I.A., Santos, L., Costa, R.L.D.C.: IoMT-trafficdata: dataset and tools for benchmarking intrusion detection in internet of medical things. IEEE Access 12, 115370\u2013115385 (2024)","DOI":"10.1109\/ACCESS.2024.3437214"},{"key":"5_CR7","volume":"234","author":"A Berguiga","year":"2025","unstructured":"Berguiga, A., Haloui, I., Alshomrani, S., Ben Jemaa, Y.: A hybrid deep learning-based intrusion detection system for IoMT networks. Comput. Netw. 234, 109913 (2025)","journal-title":"Comput. Netw."},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.1109\/JSYST.2021.3109082","volume":"16","author":"O Boyaci","year":"2021","unstructured":"Boyaci, O., et al.: Graph neural networks based detection of stealth false data injection attacks in smart grids. IEEE Syst. J. 16(2), 2946\u20132957 (2021)","journal-title":"IEEE Syst. J."},{"key":"5_CR9","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607 (2020)"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Dadkhah, S., Neto, E.C.P., Ferreira, R., Molokwu, R.C., Sadeghi, S., Ghorbani, A.A.: Ciciomt2024: attack vectors in healthcare devices-a multi-protocol dataset for assessing IoMT device security. Internet Things 28, 101351 (2024). https:\/\/doi.org\/10.1016\/j.iot.2024.101351. https:\/\/www.unb.ca\/cic\/datasets\/iomt-dataset-2024.html","DOI":"10.1016\/j.iot.2024.101351"},{"key":"5_CR11","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"5_CR12","volume":"237","author":"Y Hamdouchi","year":"2025","unstructured":"Hamdouchi, Y., Idri, A.: Boosting and feature reduction techniques for multiclass intrusion detection. Expert Syst. Appl. 237, 121486 (2025)","journal-title":"Expert Syst. Appl."},{"key":"5_CR13","volume":"117","author":"MK Hasan","year":"2022","unstructured":"Hasan, M.K., Islam, M.M., Hashem, I.A.T., Dawan, M.A., Ahmed, M., et al.: A comprehensive survey on security issues in internet of medical things. Comput. Secur. 117, 102691 (2022)","journal-title":"Comput. Secur."},{"issue":"3","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutor. 22(3), 1686\u20131721 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR15","volume":"235","author":"F Kharoubi","year":"2025","unstructured":"Kharoubi, F., Alshomrani, S., Ben Jemaa, Y.: CNN-based network intrusion detection system for real-time threat detection in IoT environments. Comput. Netw. 235, 110041 (2025)","journal-title":"Comput. Netw."},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5_CR18","first-page":"1","volume":"198","author":"P Krishnan","year":"2024","unstructured":"Krishnan, P., Shrinath, N.: A robust IoT botnet detection framework resilient to gradient-based adversarial attacks. Comput. Commun. 198, 1\u201312 (2024)","journal-title":"Comput. Commun."},{"issue":"1","key":"5_CR19","first-page":"857","volume":"35","author":"X Liu","year":"2023","unstructured":"Liu, X., et al.: Self-supervised learning: generative or contrastive. IEEE Trans. Knowl. Data Eng. 35(1), 857\u2013876 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5, 18042\u201318050 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"18006","DOI":"10.1038\/s41598-025-96203-3","volume":"15","author":"S Nazim","year":"2025","unstructured":"Nazim, S., Alam, M.M., Rizvi, S., Mustapha, J.C., Hussain, S.S., Su\u2019ud, M.M.: Multimodal malware classification using proposed ensemble deep neural network framework. Sci. Rep. 15(1), 18006 (2025)","journal-title":"Sci. Rep."},{"issue":"13","key":"5_CR22","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zolanvari, M., Jain, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"issue":"6","key":"5_CR23","volume":"32","author":"S Otoum","year":"2021","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.T.: DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 32(6), e3803 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"5_CR24","doi-asserted-by":"crossref","first-page":"20067","DOI":"10.1109\/ACCESS.2021.3055015","volume":"9","author":"KN Qureshi","year":"2021","unstructured":"Qureshi, K.N., Tayyab, M., Rehman, S.U., Jeon, G.: An intrusion detection system for the internet of medical things. IEEE Access 9, 20067\u201320076 (2021)","journal-title":"IEEE Access"},{"key":"5_CR25","first-page":"389","volume":"127","author":"V Ravi","year":"2022","unstructured":"Ravi, V., Alazab, M., Srinivasan, S.K., Arunachalam, A., Soman, K.: Attention-based multidimensional deep learning approach for cross-architecture IoMT malware detection. Futur. Gener. Comput. Syst. 127, 389\u2013406 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"23","key":"5_CR26","doi-asserted-by":"publisher","first-page":"9305","DOI":"10.3390\/s22239305","volume":"22","author":"S Riaz","year":"2022","unstructured":"Riaz, S., et al.: Malware detection in internet of things (IoT) devices using deep learning. Sensors 22(23), 9305 (2022)","journal-title":"Sensors"},{"issue":"4","key":"5_CR27","first-page":"2681","volume":"129","author":"S Saif","year":"2023","unstructured":"Saif, S., Das, P., Biswas, S., Khari, M., Shanmuganathan, V.: Analysis of ml and dl algorithms for botnet attack detection in IoMT. Wireless Pers. Commun. 129(4), 2681\u20132705 (2023)","journal-title":"Wireless Pers. Commun."},{"issue":"6","key":"5_CR28","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s11227-025-07253-3","volume":"81","author":"A Salehpour","year":"2025","unstructured":"Salehpour, A., Balafar, M.A., Souri, A.: An optimized intrusion detection system for resource-constrained IoMT environments: enhancing security through efficient feature selection and classification. J. Supercomput. 81(6), 783 (2025)","journal-title":"J. Supercomput."},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Sun, Z., Teixeira, A.M., Toor, S.: GNN-IDS: graph neural network based intrusion detection system. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1\u201312 (2024)","DOI":"10.1145\/3664476.3664515"},{"key":"5_CR30","unstructured":"Wang, H., Li, Z., Zheng, L., Sun, Y., Liu, J.: Contrastive learning for network anomaly detection. In: 2021 IEEE International Conference on Data Mining (ICDM), pp. 652\u2013661. IEEE (2021)"},{"issue":"2","key":"5_CR31","first-page":"1563","volume":"8","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Li, X., Zhao, J.: Graph neural networks for botnet detection in IoT networks. IEEE Trans. Netw. Sci. Eng. 8(2), 1563\u20131576 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5_CR32","unstructured":"Zhou, L., Wang, X., Zhang, Y.: Graph neural networks for IoT security: a comprehensive survey. In: Proceedings of the IEEE International Conference on Communications, pp.\u00a01\u20136. IEEE (2020)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16342-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:27Z","timestamp":1770800307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16342-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032163417","9783032163424"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16342-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guwahati","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.iitg.ac.in\/space2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}