{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:54:06Z","timestamp":1770285246679,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01344-1","type":"journal-article","created":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T14:02:22Z","timestamp":1662818542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Denoising Latent Representation with SOMs for Unsupervised IoT Malware Detection"],"prefix":"10.1007","volume":"3","author":[{"given":"Huu Noi","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyen Ngoc","family":"Tran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tuan Hao","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3637-9230","authenticated-orcid":false,"given":"Van Loi","family":"Cao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,10]]},"reference":[{"issue":"8","key":"1344_CR1","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R. Fog computing: helping the internet of things realize its potential. Computer. 2016;49(8):112\u20136.","journal-title":"Computer"},{"issue":"2","key":"1344_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MDAT.2016.2526612","volume":"33","author":"S Ray","year":"2016","unstructured":"Ray S, Jin Y, Raychowdhury A. The changing computing paradigm with internet of things: a tutorial introduction. IEEE Design Test. 2016;33(2):76\u201396.","journal-title":"IEEE Design Test"},{"key":"1344_CR3","doi-asserted-by":"crossref","unstructured":"Abomhara M, K\u00f8ien GM. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobil. 2015;65\u201388.","DOI":"10.13052\/jcsm2245-1439.414"},{"issue":"7","key":"1344_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J. Ddos in the iot: Mirai and other botnets. Computer. 2017;50(7):80\u20134.","journal-title":"Computer"},{"issue":"1","key":"1344_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","volume":"16","author":"C-W Tsai","year":"2013","unstructured":"Tsai C-W, Lai C-F, Chiang M-C, Yang LT. Data mining for internet of things: a survey. IEEE Commun Surv Tutor. 2013;16(1):77\u201397.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6245","key":"1344_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM. Machine learning: trends, perspectives, and prospects. Science. 2015;349(6245):255\u201360.","journal-title":"Science"},{"key":"1344_CR7","doi-asserted-by":"crossref","unstructured":"Dinh PV, Shone N, Dung PH, Shi Q, Hung NV, Ngoc TN. Behaviour-aware malware classification: Dynamic feature selection. In: 2019 11th international conference on knowledge and systems engineering (KSE). IEEE; 2019. p. 1\u20135.","DOI":"10.1109\/KSE.2019.8919491"},{"key":"1344_CR8","doi-asserted-by":"crossref","unstructured":"Hung NV, Dung PN, Ngoc TN, Phai VD, Shi Q. Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network. In: the 11th KSE. IEEE; 2019. p. 1\u20135.","DOI":"10.1109\/KSE.2019.8919284"},{"key":"1344_CR9","doi-asserted-by":"crossref","unstructured":"Vu L, Cao VL, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E. Learning latent distribution for distinguishing network traffic in intrusion detection system. In: ICC 2019-2019 IEEE international conference on communications (ICC). IEEE; 2019. p. 1\u20136.","DOI":"10.1109\/ICC.2019.8762015"},{"key":"1344_CR10","doi-asserted-by":"publisher","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","volume":"8","author":"L Vu","year":"2020","unstructured":"Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E. Deep transfer learning for iot attack detection. IEEE Access. 2020;8:107335\u201344.","journal-title":"IEEE Access"},{"key":"1344_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi A-R. D\u00efot: a federated self-learning anomaly detection system for iot. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS). IEEE; 2019. p. 756\u201367.","DOI":"10.1109\/ICDCS.2019.00080"},{"issue":"8","key":"1344_CR12","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TCYB.2018.2838668","volume":"49","author":"VL Cao","year":"2018","unstructured":"Cao VL, Nicolau M, McDermott J. Learning neural representations for network anomaly detection. IEEE Trans Cybern. 2018;49(8):3074\u201387.","journal-title":"IEEE Trans Cybern"},{"issue":"2","key":"1344_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Hengel AVD. Deep learning for anomaly detection: a review. ACM Comput Surv (CSUR). 2021;54(2):1\u201338.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1344_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C. High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recogn. 2016;58:121\u201334.","journal-title":"Pattern Recogn"},{"key":"1344_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen VQ, Nguyen VH, Le-Khac N-A, Cao VL. Clustering-based deep autoencoders for network anomaly detection. In: Proc of FDSE. Springer; 2020. p. 290\u2013303.","DOI":"10.1007\/978-3-030-63924-2_17"},{"key":"1344_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen HN, Nguyen VC, Tran NN, Cao VL. Feature representation of autoencoders for unsupervised iot malware detection. In: Future data and security engineering. Cham: Springer; 2021. p. 272\u201390.","DOI":"10.1007\/978-3-030-91387-8_18"},{"issue":"3","key":"1344_CR17","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y. N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018;17(3):12\u201322.","journal-title":"IEEE Pervasive Comput"},{"key":"1344_CR18","doi-asserted-by":"crossref","unstructured":"Cao VL, Nicolau M, McDermott J. A hybrid autoencoder and density estimation model for anomaly detection. In: International conference on parallel problem solving from nature. Springer; 2016. p. 717\u201326.","DOI":"10.1007\/978-3-319-45823-6_67"},{"key":"1344_CR19","doi-asserted-by":"crossref","unstructured":"Bui TC, Cao VL, Hoang M, Nguyen QU. A clustering-based shrink autoencoder for detecting anomalies in intrusion detection systems. In: Proc of KSE. IEEE; 2019. p. 1\u20135.","DOI":"10.1109\/KSE.2019.8919446"},{"key":"1344_CR20","doi-asserted-by":"crossref","unstructured":"Hawkins S, He H, Williams G, Baxter R. Outlier detection using replicator neural networks. In: International conference on data warehousing and knowledge discovery. Springer; 2002. p. 170\u201380.","DOI":"10.1007\/3-540-46145-0_17"},{"key":"1344_CR21","doi-asserted-by":"crossref","unstructured":"Song C, Liu F, Huang Y, Wang L, Tan T. Auto-encoder based data clustering. In: Iberoamerican congress on pattern recognition. Springer; 2013. p. 117\u201324.","DOI":"10.1007\/978-3-642-41822-8_15"},{"key":"1344_CR22","doi-asserted-by":"crossref","unstructured":"Colombini GG, de Abreu IBM, Cerri R. A self-organizing map-based method for multi-label classification. In: 2017 international joint conference on neural networks (IJCNN). IEEE; 2017. p. 4291\u201398.","DOI":"10.1109\/IJCNN.2017.7966399"},{"key":"1344_CR23","doi-asserted-by":"crossref","unstructured":"Rauber A. Labelsom: on the labeling of self-organizing maps. In: IJCNN\u201999. international joint conference on neural networks. Proceedings (Cat. No. 99CH36339), vol 5. IEEE; 1999. p. 3527\u201332.","DOI":"10.1109\/IJCNN.1999.836235"},{"key":"1344_CR24","doi-asserted-by":"crossref","unstructured":"Tian J, Azarian MH, Pecht M. Anomaly detection using self-organizing maps-based k-nearest neighbor algorithm. In: PHM society European conference, vol 2. 2014.","DOI":"10.36001\/phme.2014.v2i1.1554"},{"key":"1344_CR25","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.neunet.2018.04.016","volume":"105","author":"C Ferles","year":"2018","unstructured":"Ferles C, Papanikolaou Y, Naidoo KJ. Denoising autoencoder self-organizing map (dasom). Neural Netw. 2018;105:112\u201331.","journal-title":"Neural Netw"},{"issue":"11","key":"1344_CR26","doi-asserted-by":"publisher","first-page":"5837","DOI":"10.1109\/TII.2019.2906083","volume":"15","author":"CS Wickramasinghe","year":"2019","unstructured":"Wickramasinghe CS, Amarasinghe K, Manic M. Deep self-organizing maps for unsupervised image classification. IEEE Trans Ind Inf. 2019;15(11):5837\u201345.","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"1344_CR27","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BF00332918","volume":"59","author":"H Bourlard","year":"1988","unstructured":"Bourlard H, Kamp Y. Auto-association by multilayer perceptrons and singular value decomposition. Biol Cybern. 1988;59(4):291\u20134.","journal-title":"Biol Cybern"},{"key":"1344_CR28","first-page":"3","volume":"6","author":"GE Hinton","year":"1994","unstructured":"Hinton GE, Zemel RS. Autoencoders, minimum description length, and Helmholtz free energy. Adv Neural Inf Process Syst. 1994;6:3\u201310.","journal-title":"Adv Neural Inf Process Syst"},{"key":"1344_CR29","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge: MIT Press; 2016."},{"key":"1344_CR30","unstructured":"Vincent P, Larochelle H, Lajoie I, Bengio Y, Manzagol P-A, Bottou L. Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. JMLR. 2010;11(12)."},{"issue":"1\u20133","key":"1344_CR31","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S, Esbensen K, Geladi P. Principal component analysis. Chemom Intell Lab Syst. 1987;2(1\u20133):37\u201352.","journal-title":"Chemom Intell Lab Syst"},{"issue":"3","key":"1344_CR32","first-page":"487","volume":"30","author":"I Jolliffe","year":"2002","unstructured":"Jolliffe I. Principal component analysis. Encycl Stat Behav Sci. 2002;30(3):487.","journal-title":"Encycl Stat Behav Sci"},{"key":"1344_CR33","doi-asserted-by":"crossref","unstructured":"Sch\u00f6lkopf B, Smola A, M\u00fcller K-R. Kernel principal component analysis. In: International conference on artificial neural networks. Springer; 1997. p. 583\u201388.","DOI":"10.1007\/BFb0020217"},{"issue":"2","key":"1344_CR34","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1198\/106186006X113430","volume":"15","author":"H Zou","year":"2006","unstructured":"Zou H, Hastie T, Tibshirani R. Sparse principal component analysis. J Comput Graph Stat. 2006;15(2):265\u201386.","journal-title":"J Comput Graph Stat"},{"issue":"3","key":"1344_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1970392.1970395","volume":"58","author":"EJ Cand\u00e8s","year":"2011","unstructured":"Cand\u00e8s EJ, Li X, Ma Y, Wright J. Robust principal component analysis? J ACM (JACM). 2011;58(3):1\u201337.","journal-title":"J ACM (JACM)"},{"issue":"9","key":"1344_CR36","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T. The self-organizing map. Proc IEEE. 1990;78(9):1464\u201380.","journal-title":"Proc IEEE"},{"key":"1344_CR37","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.neunet.2012.09.018","volume":"37","author":"T Kohonen","year":"2013","unstructured":"Kohonen T. Essentials of the self-organizing map. Neural Netw. 2013;37:52\u201365.","journal-title":"Neural Netw"},{"issue":"1","key":"1344_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss K, Khoshgoftaar TM, Wang D. A survey of transfer learning. J Big Data. 2016;3(1):1\u201340.","journal-title":"J Big Data"},{"key":"1344_CR39","unstructured":"Bergstra J, Bardenet R, Bengio Y, K\u00e9gl B. Algorithms for hyper-parameter optimization, vol 24 (2011)."},{"key":"1344_CR40","unstructured":"Yu T, Zhu H. Hyper-parameter optimization: a review of algorithms and applications. 2020. arXiv:2003.05689."},{"key":"1344_CR41","unstructured":"Bergstra J, Yamins D, Cox D. Making a science of model search: hyperparameter optimization in hundreds of dimensions for vision architectures. In: ICML. PMLR; 2013. p. 115\u201323."},{"key":"1344_CR42","doi-asserted-by":"crossref","unstructured":"Mirsky Y, Doitshman T, Elovici Y, Shabtai A. Kitsune: an ensemble of autoencoders for online network intrusion detection. 2018. arXiv:1802.09089.","DOI":"10.14722\/ndss.2018.23204"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01344-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01344-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01344-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:42:55Z","timestamp":1727973775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01344-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,10]]},"references-count":42,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["1344"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01344-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,10]]},"assertion":[{"value":"16 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":".","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}],"article-number":"474"}}