{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:18:52Z","timestamp":1771467532671,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11227-024-06506-x","type":"journal-article","created":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T13:54:14Z","timestamp":1731246854000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Antivirus solution to IoT malware detection with authorial next-generation sandbox"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1715-7525","authenticated-orcid":false,"given":"Sth\u00e9fano Henrique Mendes","family":"Tavares-Silva","sequence":"first","affiliation":[]},{"given":"Sidney Marlon","family":"Lopes-Lima","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Paranhos-Pinheiro","sequence":"additional","affiliation":[]},{"given":"Liosvaldo Mariano","family":"Santiago-Abreu","sequence":"additional","affiliation":[]},{"given":"Rafael Diniz","family":"Toscano-Lima","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio Murilo Maciel","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,10]]},"reference":[{"key":"6506_CR1","doi-asserted-by":"publisher","first-page":"2152","DOI":"10.3390\/electronics9122152","volume":"9","author":"Q Al-Haija Abu","year":"2020","unstructured":"Al-Haija Abu Q, Zein-Sabatto S (2020) An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks. Electronics 9:2152","journal-title":"Electronics"},{"key":"6506_CR2","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17:2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"key":"6506_CR3","doi-asserted-by":"crossref","unstructured":"Ali M, Shiaeles S, Bendiab G, Ghita B (2020) MALGRA: machine learning and n-gram malware feature extraction and detection system. Electronics. https:\/\/www.mdpi.com\/2079-9292\/9\/11\/1777","DOI":"10.3390\/electronics9111777"},{"key":"6506_CR4","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton K et al (2009) That \u2018internet of things\u2019 thing. RFID J 22:97\u2013114","journal-title":"RFID J"},{"key":"6506_CR5","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al (2015a) Fuzzy morphological extreme learning machines to detect and classify masses in mammograms. In: 2015 IEEE International Conference on Fuzzy Systems (FUZZIEEE), Istanbul. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2015.7337975","DOI":"10.1109\/FUZZ-IEEE.2015.7337975"},{"key":"6506_CR6","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al (2015b) Morphological extreme learning machines applied to detect and classify masses in mammograms. In: 2015 International Joint Conference on Neural Networks (IJCNN), Killarney. https:\/\/doi.org\/10.1109\/IJCNN.2015.7280774","DOI":"10.1109\/IJCNN.2015.7280774"},{"key":"6506_CR7","doi-asserted-by":"publisher","unstructured":"Azevedo WW et al (2020) Morphological extreme learning machines applied to the detection and classification of mammary lesions. In: Gandhi TK, Bhattacharyya S, De S, Konar D, Dey S (ed) Advanced machine vision paradigms for medical image analysis. 1 edn. Elsevier Science, Londres, pp 1\u201330https:\/\/doi.org\/10.1016\/B978-0-12-819295-5.00003-2","DOI":"10.1016\/B978-0-12-819295-5.00003-2"},{"key":"6506_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/s10776-020-00483-7","volume":"27","author":"S Bansal","year":"2020","unstructured":"Bansal S, Kumar D (2020) IoT ecosystem: a survey on devices, gateways, operating systems, middleware and communication. Int J Wirel Inf Netw 27:340\u2013364","journal-title":"Int J Wirel Inf Netw"},{"key":"6506_CR9","doi-asserted-by":"crossref","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The Simon and Speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, pp 1\u20136","DOI":"10.1145\/2744769.2747946"},{"key":"6506_CR10","first-page":"103007","volume":"63","author":"Y Berguig","year":"2021","unstructured":"Berguig Y, Laassiri J, Hanaoui S (2021) Anonymous and lightweight secure authentication protocol for mobile agent system. J Inf Secur Appl 63:103007","journal-title":"J Inf Secur Appl"},{"key":"6506_CR11","doi-asserted-by":"crossref","unstructured":"Bezerra VH, da\u00a0Costa VGT, Martins RA, Junior SB, Miani RS, Zarpel\u00e3o BB (2018) Providing IoT host-based datasets for intrusion detection research. In: Anais do XVIII Simp\u00f3sio Brasileiro de Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais, SBC, Porto Alegre, pp 15\u201328. https:\/\/sol.sbc.org.br\/index.php\/sbseg\/article\/view\/4240","DOI":"10.5753\/sbseg.2018.4240"},{"key":"6506_CR12","doi-asserted-by":"publisher","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"6506_CR13","unstructured":"CISCO (2014) CISCO 2014 whitepaper. http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf"},{"key":"6506_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7561-3_10","author":"P Faruki","year":"2019","unstructured":"Faruki P, Buddhadev B (2019) DroidDivesDeep: android malware classification via low level monitorable features with deep neural networks. Int Conf Secur Priv. https:\/\/doi.org\/10.1007\/978-981-13-7561-3_10","journal-title":"Int Conf Secur Priv"},{"key":"6506_CR15","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29:1645\u20131660. https:\/\/doi.org\/10.1016\/j.future.2013.01.010","journal-title":"Future Gener Comput Syst"},{"key":"6506_CR16","unstructured":"Hardy W, Lingwei CT (2016) DL 4 MS: a deep learning framework for intelligent malware detection. In: International Conference on Data Mining, pp 61\u201367"},{"issue":"3","key":"6506_CR17","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/72.846750","volume":"11","author":"GB Huang","year":"2000","unstructured":"Huang GB et al (2000) Classification ability of single hidden layer feedforward neural networks. IEEE Trans Neural Netw Learn Syst 11(3):799\u2013801. https:\/\/doi.org\/10.1109\/72.846750","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"2","key":"6506_CR18","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang GB et al (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern 42(2):513\u2013519. https:\/\/doi.org\/10.1109\/TSMCB.2011.2168604","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"6506_CR19","unstructured":"INTEL (2018) McAfee labs. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-mar-2018.pdf. Accessed on Feb 2020"},{"key":"6506_CR20","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SMR Islam","year":"2015","unstructured":"Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678\u2013708. https:\/\/doi.org\/10.1109\/ACCESS.2015.2437951","journal-title":"IEEE Access"},{"key":"6506_CR21","doi-asserted-by":"crossref","unstructured":"Kadir AFA, Stakhanova N, Ghorbani AA (2015) Android botnets: What urls are telling us. In: International Conference on Network and System Security, Springer. pp 78\u201391","DOI":"10.1007\/978-3-319-25645-0_6"},{"key":"6506_CR22","doi-asserted-by":"publisher","unstructured":"Kalash M, Rochan MT (2018) Malware classification with deep convolutional neural networks. In: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). https:\/\/doi.org\/10.1109\/NTMS.2018.8328749","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"6506_CR23","doi-asserted-by":"publisher","unstructured":"Lima S (2021) Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses. In: Cruz-Cunha MM, Mateus-Coelho NR (eds) Handbook of Research on Cyber Crime and Information Privacy, vol 1, 1st edn. IGI Global, Hershey. https:\/\/doi.org\/10.4018\/978-1-7998-5728-0.ch020","DOI":"10.4018\/978-1-7998-5728-0.ch020"},{"key":"6506_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-020-00220-4","author":"S Lima","year":"2020","unstructured":"Lima S, Silva H, Luz J et al (2020) Artificial intelligence-based antivirus in order to detect malware preventively. Prog Artif Intell. https:\/\/doi.org\/10.1007\/s13748-020-00220-4","journal-title":"Prog Artif Intell"},{"key":"6506_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07447-4","author":"S Lima","year":"2022","unstructured":"Lima S, Silva SH, Pinheiro RP (2022) Next-generation antivirus endowed with web-server sandbox applied to audit fileless attack. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-022-07447-4","journal-title":"Soft Comput"},{"key":"6506_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2016.04.029","volume":"134","author":"S Lima","year":"2016","unstructured":"Lima S, Silva-Filho AG, Santos WP (2016) Detection and classification of masses in mammographic images in a multi-kernel approach. Comput Methods Programs Biomed 134:11\u201329. https:\/\/doi.org\/10.1016\/j.cmpb.2016.04.029","journal-title":"Comput Methods Programs Biomed"},{"key":"6506_CR27","doi-asserted-by":"publisher","first-page":"103724","DOI":"10.1016\/j.micpro.2020.103724","volume":"81","author":"SM Lima","year":"2021","unstructured":"Lima SM, Souza DM, Pinheiro R, Silva S et al (2021) Next generation antivirus endowed with bitwise morphological extreme learning machines. Microprocess Microsyst 81:103724. https:\/\/doi.org\/10.1016\/j.micpro.2020.103724","journal-title":"Microprocess Microsyst"},{"key":"6506_CR28","doi-asserted-by":"publisher","first-page":"103724","DOI":"10.1016\/j.micpro.2020.103724","volume":"81","author":"SM Lima","year":"2021","unstructured":"Lima SM, Souza DM, Pinheiro RP, Silva SH, Lopes PG, de Lima RD, de Oliveira JR, de Monteiro TA, Fernandes SM, de Albuquerque EQ, da Silva WW, dos Santos WP (2021) Next generation antivirus endowed with bitwise morphological extreme learning machines. Microprocessors Microsyst 81:103724. https:\/\/doi.org\/10.1016\/j.micpro.2020.103724","journal-title":"Microprocessors Microsyst"},{"key":"6506_CR29","unstructured":"Lima SML, Silva-Filho Santos WP (2020b) Morphological decomposition to detect and classify lesions in mammograms. In: dos Santos WP, de Santana MA, da Silva WWA (ed) Understanding a Cancer Diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"6506_CR30","doi-asserted-by":"publisher","unstructured":"Lima SML, Silva-Filho AG, Dos\u00a0Santos WP (2014) A methodology for classification of lesions in mammographies using zernike moments, elm and svm neural networks in a multi-kernel approach. In: 2014 IEEE International Conference on Systems, Man and Cybernetics SMC, San Diego. https:\/\/doi.org\/10.1109\/SMC.2014.6974041","DOI":"10.1109\/SMC.2014.6974041"},{"key":"6506_CR31","doi-asserted-by":"crossref","unstructured":"Macedo D, Guedes LA, Silva I (2014) A dependability evaluation for internet of things incorporating redundancy aspects. In: Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control, IEEE. pp 417\u2013422","DOI":"10.1109\/ICNSC.2014.6819662"},{"key":"6506_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/RDCAPE.2017.8358312","author":"S Maniath","year":"2017","unstructured":"Maniath S, Ashok A (2017) Deep learning LSTM based ransomware detection. Recent Dev Control Automat Power Eng. https:\/\/doi.org\/10.1109\/RDCAPE.2017.8358312","journal-title":"Recent Dev Control Automat Power Eng"},{"key":"6506_CR33","unstructured":"MELM (2024) MELM: morphological extreme learning machine. https:\/\/github.com\/DejavuForensics\/mELM"},{"key":"6506_CR34","unstructured":"Mitchell, T. M., & Mitchell, T. M. (1997). Machine learning (Vol. 1, No. 9). New York: McGraw-hill."},{"key":"6506_CR35","unstructured":"Nigam, R. (2015). A timeline of mobile botnets. Virus Bulletin, March, 1630."},{"key":"6506_CR36","unstructured":"Oracle. What is AI? Learn about artificial intelligence. https:\/\/www.oracle.com\/artificial-intelligence\/what-is-ai\/"},{"key":"6506_CR37","unstructured":"Patterson, D. A., & Hennessy, J. L. (2016). Computer organization and design ARM edition: the hardware software interface. Morgan kaufmann."},{"key":"6506_CR38","unstructured":"Pereira JMS et al (2020) Method for classification of breast lesions in thermographic images using ELM classifiers. In: dos Santos WP, de Santana MA, da Silva WWA (ed) Understanding a Cancer Diagnosis. https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"6506_CR39","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1038\/s41598-022-05921-5","volume":"12","author":"R Pinheiro","year":"2022","unstructured":"Pinheiro R, Lima S, Souza D et al (2022) Antivirus applied to JAR malware detection based on runtime behaviors. Sci Rep Nat 12:1945. https:\/\/doi.org\/10.1038\/s41598-022-05921-5","journal-title":"Sci Rep Nat"},{"key":"6506_CR40","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/JIOT.2015.2498900","volume":"3","author":"MA Razzaque","year":"2015","unstructured":"Razzaque MA, Milojevic-Jevric M, Palade A, Clarke S (2015) Middleware for internet of things: a survey. IEEE Internet Things J 3:70\u201395","journal-title":"IEEE Internet Things J"},{"key":"6506_CR41","unstructured":"Refade (2024) Refade (a retrieval of elf files arm to dynamic analysis). https:\/\/github.com\/DejavuForensics\/IoT_ARM"},{"key":"6506_CR42","unstructured":"SANS (2017) SANS institute InfoSec reading room. Out with the old, in with the new: replacing traditional antivirus. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/old-new-replacing-traditional-antivirus-37377. Accessed on Feb 2020"},{"key":"6506_CR43","unstructured":"Santos WP (2011) Mathematical morphology in digital document analysis and processing, vol 8. Nova Science, New York"},{"key":"6506_CR44","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ins.2011.09.016","volume":"231","author":"F Shahzad","year":"2013","unstructured":"Shahzad F, Shahzad M, Farooq M (2013) In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS. Inf Sci 231:45\u201363. https:\/\/doi.org\/10.1016\/j.ins.2011.09.016","journal-title":"Inf Sci"},{"key":"6506_CR45","doi-asserted-by":"crossref","unstructured":"Srinivasu PN, Bhoi AK, Nayak SR, Bhutta MR, Wo\u017aniak M (2021) Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5 g network. Electronics. https:\/\/www.mdpi.com\/2079-9292\/10\/12\/1437","DOI":"10.3390\/electronics10121437"},{"key":"6506_CR46","doi-asserted-by":"publisher","unstructured":"Su J, Vasconcellos D (2018) Lightweight classification of IoT malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). https:\/\/doi.org\/10.1109\/COMPSAC.2018.10315","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"6506_CR47","doi-asserted-by":"crossref","unstructured":"Szczepaniuk H, Szczepaniuk EK (2022) Standardization of IoT ecosystems: open challenges, current solutions, and future directions. In: Internet of things. CRC Press, Boca Raton, pp 23\u201342","DOI":"10.1201\/9781003219620-2"},{"key":"6506_CR48","doi-asserted-by":"publisher","unstructured":"Tarai SK, Shailendra S (2019) Optimal and secure controller placement in SDN based smart city network. In: 2019 International Conference on Information Networking (ICOIN), pp 254\u2013261. https:\/\/doi.org\/10.1109\/ICOIN.2019.8718165","DOI":"10.1109\/ICOIN.2019.8718165"},{"key":"6506_CR49","first-page":"1379","volume":"10","author":"SI Tay","year":"2018","unstructured":"Tay SI, Lee T, Hamid N, Ahmad ANA (2018) An overview of industry 4.0: definition, components, and government initiatives. J Adv Res Dyn Control Syst 10:1379\u20131387","journal-title":"J Adv Res Dyn Control Syst"},{"key":"6506_CR50","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.biosystemseng.2017.09.007","volume":"164","author":"A Tzounis","year":"2017","unstructured":"Tzounis A, Katsoulas N, Bartzanas T, Kittas C (2017) Internet of things in agriculture, recent advances and future challenges. Biosys Eng 164:31\u201348","journal-title":"Biosys Eng"},{"key":"6506_CR51","doi-asserted-by":"publisher","first-page":"462752","DOI":"10.1155\/2015\/462752","volume":"11","author":"F Wang","year":"2015","unstructured":"Wang F, Hu L, Zhou J, Zhao K (2015) A survey from the perspective of evolutionary process in the internet of things. Int J Distrib Sens Netw 11:462752. https:\/\/doi.org\/10.1155\/2015\/462752","journal-title":"Int J Distrib Sens Netw"},{"key":"6506_CR52","doi-asserted-by":"crossref","unstructured":"Zhou W, Piramuthu S (2014) Security\/privacy of wearable fitness tracking IoT devices. In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), IEEE. pp 1\u20135","DOI":"10.1109\/CISTI.2014.6877073"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06506-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06506-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06506-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T14:03:02Z","timestamp":1731247382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06506-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,10]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6506"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06506-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,10]]},"assertion":[{"value":"26 September 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of the work declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that no human participants were involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"This research did not include health-care intervention of human participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"151"}}