{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:12:52Z","timestamp":1756311172089,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006162","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Ci\u00eancia e Tecnologia do Estado de Pernambuco","doi-asserted-by":"publisher","award":["BIC-0927-1.03\/22"],"award-info":[{"award-number":["BIC-0927-1.03\/22"]}],"id":[{"id":"10.13039\/501100006162","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00526-0","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T15:02:41Z","timestamp":1717426961000},"page":"729-749","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Antimalware applied to IoT malware detection based on softcore processor endowed with authorial sandbox"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4267-6282","authenticated-orcid":false,"given":"Igor","family":"Pinheiro Henriques de Ara\u00fajo","sequence":"first","affiliation":[]},{"given":"Liosvaldo","family":"Mariano Santiago de Abreu","sequence":"additional","affiliation":[]},{"given":"Sth\u00e9fano","family":"Henrique Mendes Tavares Silva","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Paranhos Pinheiro","sequence":"additional","affiliation":[]},{"given":"Sidney","family":"Marlon Lopes de Lima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"526_CR1","doi-asserted-by":"crossref","unstructured":"Ali, M., Shiaeles, S., Bendiab, G., Ghita, B.: Malgra: machine learning and n-gram malware feature extraction and detection system. Electronics 9. https:\/\/www.mdpi.com\/2079-9292\/9\/11\/1777 (2020)","DOI":"10.3390\/electronics9111777"},{"key":"526_CR2","doi-asserted-by":"crossref","unstructured":"Azevedo, W.W. et al..: Fuzzy morphological extreme learning machines to detect and classify masses in mammograms. In: 2015 IEEE International Conference on Fuzzy Systems (FUZZIEEE), Istanbul (2015). https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2015.7337975","DOI":"10.1109\/FUZZ-IEEE.2015.7337975"},{"key":"526_CR3","doi-asserted-by":"crossref","unstructured":"Azevedo, W.W. et al..: Morphological extreme learning machines applied to detect and classify masses in mammograms. In: 2015 International Joint Conference on Neural Networks (IJCNN), Killarney (2015). https:\/\/doi.org\/10.1109\/IJCNN.2015.7280774","DOI":"10.1109\/IJCNN.2015.7280774"},{"key":"526_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/B978-0-12-819295-5.00003-2","volume-title":"Advanced Machine Vision Paradigms for Medical Image Analysis","author":"WW Azevedo","year":"2020","unstructured":"Azevedo, W.W., et al.: Morphological extreme learning machines applied to the detection and classification of mammary lesions. In: Gandhi, T.K., Bhattacharyya, S., De, S., Konar, D., Dey, S. (eds.) Advanced Machine Vision Paradigms for Medical Image Analysis, 1st edn., pp. 1\u201330. Elsevier Science, Londres (2020). https:\/\/doi.org\/10.1016\/B978-0-12-819295-5.00003-2","edition":"1"},{"key":"526_CR5","unstructured":"CISCO: The internet of things how the next evolution of the internet is changing everything (2011). http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"526_CR6","doi-asserted-by":"publisher","first-page":"9459","DOI":"10.1007\/s00500-023-08442-z","volume":"27","author":"R Dalal","year":"2023","unstructured":"Dalal, R., Khari, M.: Efficacious implementation of deep q-routing in opportunistic network. Data Anal. Mach. Learn. 27, 9459\u20139477 (2023). https:\/\/doi.org\/10.1007\/s00500-023-08442-z","journal-title":"Data Anal. Mach. Learn."},{"key":"526_CR7","doi-asserted-by":"crossref","unstructured":"Faruki, P., Buddhadev, B.: Droiddivesdeep: android malware classification via low level monitorable features with deep neural networks. In: International Conference on Security & Privacy (2019). https:\/\/doi.org\/10.1007\/978-981-13-7561-3_10","DOI":"10.1007\/978-981-13-7561-3_10"},{"key":"526_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1421-3","volume-title":"Low-Energy Fpgas: Architecture and Design","author":"V George","year":"2001","unstructured":"George, V., Rabaey, J.: Low-Energy Fpgas: Architecture and Design. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"526_CR9","unstructured":"Hardy, W., Lingwei, C.t.: Dl 4 md: a deep learning framework for intelligent malware detection. In: Int\u2019l Conf. Data Mining, pp. 61\u201367 (2016)"},{"key":"526_CR10","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A.: Droiddelver: an android malware detection system using deep belief network based on API call blocks. In: Web-Age Information Management. WAIM 2016 International Workshops, MWDA, SDMMW, and SemiBDMA (2016). https:\/\/doi.org\/10.1007\/978-3-319-47121-1_5","DOI":"10.1007\/978-3-319-47121-1_5"},{"issue":"2","key":"526_CR11","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang, G.B., et al.: Extreme learning machine for regression and multiclass classification. IEEE Trans. Syst. Man Cybern. 42(2), 513\u2013519 (2012). https:\/\/doi.org\/10.1109\/TSMCB.2011.2168604","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"526_CR12","unstructured":"INTEL: McAfee Labs. Accessed Feb 2022. (2021) https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-jun-2021.pdf"},{"key":"526_CR13","unstructured":"IoT_SPARC: IoT_SPARC (Retrieval Internet of Thing for SPARC Malware Analysis). Accessed June 2024. (2022) https:\/\/github.com\/DejavuForensics\/IoT_SPARC"},{"key":"526_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.032","author":"M Iwendi","year":"2020","unstructured":"Iwendi, M., et al.: N-sanitization: a semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.07.032","journal-title":"Comput. Commun."},{"key":"526_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10551-7_13","author":"GP Kachare","year":"2002","unstructured":"Kachare, G.P., Choudhary, G., Shandilya, S.K., Sihag, V.: Sandbox environment for real time malware analysis of iot devices. Commun. Comput. Inf. Sci. (2002). https:\/\/doi.org\/10.1007\/978-3-031-10551-7_13","journal-title":"Commun. Comput. Inf. Sci."},{"key":"526_CR16","unstructured":"Kady, S., Khater, M., Alhafnwani, M.: Mips, arm and sparc\u2014an architecture comparison. In: Proceedings of the World Congress on Engineering (2014)"},{"key":"526_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9780429298462-6","author":"M Khari","year":"2020","unstructured":"Khari, M., Dalal, R., Rohilla, P.: Extended paradigms for botnets with wot applications: a review. Smart Innov. Web Things (2020). https:\/\/doi.org\/10.1201\/9780429298462-6","journal-title":"Smart Innov. Web Things"},{"key":"526_CR18","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5728-0.ch020","volume-title":"Handbook of Research on Cyber Crime and Information Privacy","author":"S Lima","year":"2021","unstructured":"Lima, S.: Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses. In: Cruz-Cunha, M.M., Mateus-Coelho, N.R. (eds.) Handbook of Research on Cyber Crime and Information Privacy, vol. 1, 1st edn. IGI Global, Hershey (2021). https:\/\/doi.org\/10.4018\/978-1-7998-5728-0.ch020","edition":"1"},{"key":"526_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-020-00220-4","author":"S Lima","year":"2021","unstructured":"Lima, S., Silva, H., Luz, J., et al.: Artificial intelligence-based antivirus in order to detect malware preventively. Prog. Artif. Intell. (2021). https:\/\/doi.org\/10.1007\/s13748-020-00220-4","journal-title":"Prog. Artif. Intell."},{"key":"526_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01978-4","author":"S Lima","year":"2024","unstructured":"Lima, S., Silva, S.H.M.T., et al.: Next generation antivirus for javascript malware detection based on dynamic features. Knowl. Inf. Syst. (2024). https:\/\/doi.org\/10.1007\/s10115-023-01978-4","journal-title":"Knowl. Inf. Syst."},{"key":"526_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07447-4","author":"S Lima","year":"2022","unstructured":"Lima, S., Silva, S., Pinheiro, R.E.: Next-generation antivirus endowed with web-server sandbox applied to audit fileless attack. Soft Comput. (2022). https:\/\/doi.org\/10.1007\/s00500-022-07447-4","journal-title":"Soft Comput."},{"key":"526_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2016.04.029","volume":"134","author":"S Lima","year":"2016","unstructured":"Lima, S., Silva-Filho, A.G., Santos, W.P.: Detection and classification of masses in mammographic images in a multi-kernel approach. Comput. Methods Progr. Biomed. 134, 11\u201329 (2016). https:\/\/doi.org\/10.1016\/j.cmpb.2016.04.029","journal-title":"Comput. Methods Progr. Biomed."},{"key":"526_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103724","volume":"81","author":"S Lima","year":"2021","unstructured":"Lima, S., Souza, D., Pinheiro, R., Silva, S., et al.: Next generation antivirus endowed with bitwise morphological extreme learning machines. Microprocess. Microsyst. 81, 103724 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2020.103724","journal-title":"Microprocess. Microsyst."},{"key":"526_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103724","volume":"81","author":"SM Lima","year":"2021","unstructured":"Lima, S.M., Souza, D.M., Pinheiro, R.P., Silva, S.H., Lopes, P.G., de Lima, R.D., de Oliveira, J.R., Monteiro, T.A., Fernandes, S.M., Albuquerque, E.Q., da Silva, W.W., dos Santos, W.P.: Next generation antivirus endowed with bitwise morphological extreme learning machines. Microprocess. Microsyst. 81, 103724 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2020.103724","journal-title":"Microprocess. Microsyst."},{"key":"526_CR25","unstructured":"Lima, S.M.L., Silva-Filho, Santos, W.P.: Morphological decomposition to detect and classify lesions in mammograms. In: dos Santos, W.P., de Santana, M.A.; da Silva, W.W.A. (eds.) Understanding a cancer diagnosis (2020) https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"526_CR26","doi-asserted-by":"publisher","unstructured":"Lima, S.M.L., Silva-Filho, A.G., Dos\u00a0Santos, W.P.: A methodology for classification of lesions in mammographies using zernike moments, ELM and SVM neural networks in a multi-kernel approach. In: 2014 IEEE International Conference on Systems, Man and Cybernetics SMC, San Diego (2014) https:\/\/doi.org\/10.1109\/SMC.2014.6974041","DOI":"10.1109\/SMC.2014.6974041"},{"key":"526_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102613","author":"S Liu","year":"2022","unstructured":"Liu, S., Feng, P., Wang, S., Sun, K., Cao, J.: Enhancing malware analysis sandboxes with emulated user behavior. Comput. Secur. (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102613","journal-title":"Comput. Secur."},{"key":"526_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/RDCAPE.2017.8358312","author":"S Maniath","year":"2017","unstructured":"Maniath, S., Ashok, A.: Deep learning LSTM based ransomware detection. Recent Dev Control Autom Power Eng (2017). https:\/\/doi.org\/10.1109\/RDCAPE.2017.8358312","journal-title":"Recent Dev Control Autom Power Eng"},{"key":"526_CR29","unstructured":"mELM. melm\u2014morphological extreme learning machine (2023) https:\/\/github.com\/DejavuForensics\/melm"},{"key":"526_CR30","unstructured":"Pereira, J.M.S. et al.: Method for classification of breast lesions in thermographic images using ELM classifiers. In: dos Santos, W.P., de Santana, M.A., da Silva, W.W.A. (eds.). Understanding a Cancer Diagnosis (2020). https:\/\/novapublishers.com\/shop\/understanding-a-cancer-diagnosis\/"},{"key":"526_CR31","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1038\/s41598-022-05921-5","volume":"12","author":"R Pinheiro","year":"2022","unstructured":"Pinheiro, R., Lima, S., Souza, D., et al.: Antivirus applied to jar malware detection based on runtime behaviors. Sci. Rep. Nat. 12, 1945 (2022). https:\/\/doi.org\/10.1038\/s41598-022-05921-5","journal-title":"Sci. Rep. Nat."},{"key":"526_CR32","doi-asserted-by":"publisher","unstructured":"Rehida, P., Markowsky, G., Sachenko, A., Savenko, O.: State-based sandbox tool for distributed malware detection with avoid techniques. In: 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) (2023) https:\/\/doi.org\/10.1109\/DESSERT61349.2023.10416467","DOI":"10.1109\/DESSERT61349.2023.10416467"},{"key":"526_CR33","unstructured":"Sans: Sans institute infosec reading room. out with the old, in with the new: replacing traditional antivirus (2017) https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/old-new-replacing-traditional-antivirus-37377"},{"key":"526_CR34","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.neucom.2018.10.063","volume":"329","author":"MM Santos","year":"2019","unstructured":"Santos, M.M., Silva Filho, A.G., Santos, W.P.: Deep convolutional extreme learning machines: filters combination and error model validation. Neurocomputing 329, 359\u2013369 (2019)","journal-title":"Neurocomputing"},{"key":"526_CR35","doi-asserted-by":"crossref","unstructured":"Shang, L., Kaviani, A., Bathala, K.: Dynamic power consumption in the virtex-11 FPGA family. In: Proceedings ACM lnternational Symposium Field-Programmable GateArrays (2002)","DOI":"10.1145\/503070.503072"},{"key":"526_CR36","doi-asserted-by":"publisher","unstructured":"Su, J., Vasconcellos, D.: Lightweight classification of iot malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (2018) https:\/\/doi.org\/10.1109\/COMPSAC.2018.10315","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"526_CR37","first-page":"1379","volume":"10","author":"SI Tay","year":"2018","unstructured":"Tay, S.I., Lee, T., Hamid, N., Ahmad, A.N.A.: An overview of industry 4.0: definition, components, and government initiatives. J. Adv. Res. Dyn. Control Syst. 10, 1379\u20131387 (2018)","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"key":"526_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.10.006","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar, R., Soman, K.P.: Deepmalnet: evaluating shallow and deep networks for static PE malware detection. ICT Exp. (2018). https:\/\/doi.org\/10.1016\/j.icte.2018.10.006","journal-title":"ICT Exp."},{"key":"526_CR39","unstructured":"Wilkins, D.: Hardware assisted breakpoints in the Linux kernel for Leon Sparc. Bachelor\u2019s thesis 2020. Department of Computer Science and Engineering. Chalmers University of Technology\/University of Gothenburg (2020)"},{"key":"526_CR40","doi-asserted-by":"publisher","first-page":"5583","DOI":"10.1109\/TII.2020.3021689","volume":"17","author":"M Wozniak","year":"2021","unstructured":"Wozniak, M., Silka, J., Wieczorek, M., Alrashoud, M.: Recurrent neural network model for iot and networking malware threat detection. IEEE Trans. Ind. Inf. 17, 5583\u20135594 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3021689","journal-title":"IEEE Trans. Ind. Inf."},{"key":"526_CR41","doi-asserted-by":"crossref","unstructured":"Zhou, W., Piramuthu, S.: Security\/privacy of wearable fitness tracking iot devices, In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"526_CR42","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2022.08.002","author":"X Zhu","year":"2022","unstructured":"Zhu, X., Deng, H.: A security situation awareness approach for iot software chain based on Markov game model. Int. J. Interact. Multimed. Artif. Intell. (2022). https:\/\/doi.org\/10.9781\/ijimai.2022.08.002","journal-title":"Int. J. Interact. Multimed. Artif. Intell."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00526-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00526-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00526-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:11:52Z","timestamp":1729005112000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00526-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":42,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["526"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00526-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"22 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that no human participants were involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare that no human participants were involved in this research.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors declare that no human participants were involved in this research.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}