{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:38:00Z","timestamp":1774993080655,"version":"3.50.1"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada\u2014NSERC","doi-asserted-by":"publisher","award":["RGPIN-2020-04701"],"award-info":[{"award-number":["RGPIN-2020-04701"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004489","name":"Mitacs Global Research Internship","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3235389","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T20:50:13Z","timestamp":1673297413000},"page":"5004-5018","source":"Crossref","is-referenced-by-count":63,"title":["IoT Malware Analysis Using Federated Learning: A Comprehensive Survey"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6907-6738","authenticated-orcid":false,"given":"Madumitha","family":"Venkatasubramanian","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1240-6433","authenticated-orcid":false,"given":"Arash Habibi","family":"Lashkari","sequence":"additional","affiliation":[{"name":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6670-1032","authenticated-orcid":false,"given":"Saqib","family":"Hakak","sequence":"additional","affiliation":[{"name":"Canadian Institute for Cybersecurity, Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105366"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803194"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767188"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.122001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781003333050"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.agsy.2022.103497"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102736"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.246"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845396"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103688"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.04.005"},{"key":"ref12","first-page":"15","article-title":"IoT botnet malware classification using Weka tool and Scikit-learn machine learning","volume-title":"Proc. 7th Int. Conf. Electr. Eng., Comput. Sci. Informat. (EECSI)","author":"Stiawan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIIT49094.2020.9071531"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075315"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095077"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3090430"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2992630"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3203249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1051\/0004-6361\/202140846"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102355"},{"key":"ref23","article-title":"Fusion of federated learning and industrial Internet of Things: A survey","volume":"212","author":"Dev","year":"2022","journal-title":"Comput. Netw."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182055"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.12.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221263"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-385514-5.00004-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554643"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IEMTRONICS52119.2021.9422537"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMCIS51567.2020.9354315"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/ICMU.2018.8653580"},{"key":"ref33","volume-title":"Radare2 Github Repository","year":"2017"},{"key":"ref34","author":"Eagle","year":"2008","journal-title":"The IDA Pro Book: The Unofficial Guide to the World\u2019s Most Popular Disassembler"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04648-4_22"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA50009.2020.00062"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2019.8905120"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978335"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS52919.2021.9486386"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HONET50430.2020.9322809"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102779"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433203"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995887"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.149"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005981"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2018.8355435"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533481"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR51502.2020.9306520"},{"issue":"27","key":"ref52","first-page":"1","article-title":"Two-stage hybrid malware detection using deep learning","volume":"11","author":"Baek","year":"2021","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119778"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE48956.2021.9352145"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346821"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396202"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3097296"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.021"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00020"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP.2018.8549713"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/KSE.2018.8573374"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165381"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102098"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.12.102"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102474"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109384"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2022.08.004"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSE50710.2020.00020"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.04.001"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.01.006"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.028"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10061110"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2023.3303492"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SAGC52752.2021.00036"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100253"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/app12020670"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS52692.2021.9581000"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT48636.2020.9061261"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2022.100263"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10010027"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102631"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MECO52532.2021.9460304"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2022.3185327"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/RDAAPS48126.2021.9452005"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682053"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685644"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC52777.2021.9580315"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771929"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid51090.2021.00101"},{"key":"ref97","first-page":"14606","article-title":"Linear convergence in federated learning: Tackling client heterogeneity and sparse gradients","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Mitra"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00982"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3242734"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796935"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57997-5_26"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3064351"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.12.003"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2019.2904348"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154285"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10012334.pdf?arnumber=10012334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T09:43:33Z","timestamp":1707471813000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10012334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":107,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3235389","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}