{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T20:26:14Z","timestamp":1777753574073,"version":"3.51.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00745-w","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T01:03:24Z","timestamp":1743469404000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["AI driven IOMT security framework for advanced malware and ransomware detection in SDN"],"prefix":"10.1186","volume":"14","author":[{"given":"Sultan H.","family":"Almotiri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"745_CR1","doi-asserted-by":"publisher","unstructured":"Wall DS (2024) Cybercrime: the transformation of crime in the information age. Wiley.\u00a0https:\/\/doi.org\/10.1080\/13691180802158557","DOI":"10.1080\/13691180802158557"},{"key":"745_CR2","unstructured":"Cobos EV, Cakir S A review of the economic costs of cyber incidents.\u00a0https:\/\/coilink.org\/20.500.12592\/5mxknq5"},{"key":"745_CR3","doi-asserted-by":"crossref","unstructured":"Brooks C (2024) Inside cyber: how AI, 5G, IoT, and quantum computing will transform privacy and our security. Wiley.\u00a0https:\/\/www.wiley.com\/en-es\/Inside+Cyber%3A+How+AI%2C+5G%2C+IoT%2C+and+Quantum+Computing+Will+Transform+Privacy+and+Our+Security-p-9781394254958","DOI":"10.1002\/9781394310562"},{"key":"745_CR4","doi-asserted-by":"crossref","first-page":"292","DOI":"10.4337\/9781802206791.00029","volume-title":"Handbook of Research on Entrepreneurship and Conflict","author":"W Naud\u00e9","year":"2024","unstructured":"Naud\u00e9 W (2024) Destructive digital entrepreneurship. Handbook of research on entrepreneurship and conflict. Edward Elgar Publishing, pp 292\u2013328"},{"key":"745_CR5","volume-title":"Bombarded: How to fight back against the online assault on democracy","author":"C Krohn","year":"2020","unstructured":"Krohn C, Farmer T (2020) Bombarded: how to fight back against the online assault on democracy. Made for Success Publishing"},{"key":"745_CR6","doi-asserted-by":"publisher","unstructured":"Li D, Xing W (2025) A comparative study on sustainable development of online education platforms at home and abroad since the twenty-first century based on big data analysis. Education and Information Technologies. pp. 1\u201322.\u00a0https:\/\/doi.org\/10.1007\/s10639-025-13400-3","DOI":"10.1007\/s10639-025-13400-3"},{"key":"745_CR7","doi-asserted-by":"crossref","first-page":"104155","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou W et al (2025) Hidim: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. Computers Secur 148:104155","journal-title":"Computers Secur"},{"issue":"4","key":"745_CR8","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1109\/COMST.2018.2837161","volume":"20","author":"R Amin","year":"2018","unstructured":"Amin R, Reisslein M, Shah N (2018) Hybrid SDN networks: A survey of existing approaches. IEEE Commun Surv Tutorials 20(4):3259\u20133306","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"745_CR9","first-page":"1","volume":"56","author":"F Deldar","year":"2023","unstructured":"Deldar F, Abadi M (2023) Deep learning for zero-day malware detection and classification: A survey. ACM-CSUR 56(2):1\u201337","journal-title":"ACM-CSUR"},{"issue":"1","key":"745_CR10","doi-asserted-by":"crossref","first-page":"e0312425","DOI":"10.1371\/journal.pone.0312425","volume":"20","author":"S Mehmood","year":"2025","unstructured":"Mehmood S et al (2025) Distributed denial of services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP. PLoS ONE 20(1):e0312425","journal-title":"PLoS ONE"},{"key":"745_CR11","doi-asserted-by":"crossref","first-page":"91028","DOI":"10.1109\/ACCESS.2020.2992580","volume":"8","author":"OS Al-Heety","year":"2020","unstructured":"Al-Heety OS et al (2020) A comprehensive survey: benefits, services, recent works, challenges, security, and use cases for sdn-vanet. IEEE Access 8:91028\u201391047","journal-title":"IEEE Access"},{"key":"745_CR12","volume-title":"RFL-APIA: a Comprehensive Framework for mitigating poisoning attacks and promoting model aggregation in IIoT Federated Learning","author":"C Li","year":"2024","unstructured":"Li C et al (2024) RFL-APIA: a comprehensive framework for mitigating poisoning attacks and promoting model aggregation in IIoT federated learning. IEEE Transactions on Industrial Informatics"},{"issue":"9","key":"745_CR13","doi-asserted-by":"crossref","first-page":"5366","DOI":"10.1109\/TNNLS.2022.3165627","volume":"34","author":"J-Y Xia","year":"2022","unstructured":"Xia J-Y et al (2022) Metalearning-based alternating minimization algorithm for nonconvex optimization. IEEE Trans Neural Networks Learn Syst 34(9):5366\u20135380","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"745_CR14","doi-asserted-by":"publisher","unstructured":"Lin W et al (2024) Input and output matter: malicious traffic detection with explainability. IEEE Network.\u00a0https:\/\/doi.org\/10.1109\/MNET.2024.3481045","DOI":"10.1109\/MNET.2024.3481045"},{"key":"745_CR15","first-page":"2022010","volume":"2","author":"N Li","year":"2023","unstructured":"Li N et al (2023) A review of security issues and solutions for precision health in Internet-of-Medical-Things systems. Secur Saf 2:2022010","journal-title":"Secur Saf"},{"issue":"5","key":"745_CR16","doi-asserted-by":"crossref","first-page":"5571","DOI":"10.1109\/TMC.2023.3314837","volume":"23","author":"F Han","year":"2023","unstructured":"Han F et al (2023) Accuth $^+ $+: Accelerometer-Based Anti-Spoofing voice authentication on Wrist-Worn wearables. IEEE Trans Mob Comput 23(5):5571\u20135588","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"745_CR17","first-page":"155","volume":"34","author":"A Minnaar","year":"2021","unstructured":"Minnaar A, Herbig FJ (2021) Cyberattacks and the cybercrime threat of ransomware to hospitals and healthcare services during the COVID-19 pandemic. Acta Criminologica: Afr J Criminol Victimology 34(3):155\u2013185","journal-title":"Acta Criminologica: Afr J Criminol Victimology"},{"key":"745_CR18","doi-asserted-by":"publisher","unstructured":"Analytica O Costa Rica\u2019s new president faces immediate challenges. Emerald Expert Briefings, 2022(oxan-db). https:\/\/doi.org\/10.1108\/OXAN-DB270270","DOI":"10.1108\/OXAN-DB270270"},{"key":"745_CR19","doi-asserted-by":"publisher","unstructured":"Liu Y et al (2024) Resilient formation tracking for networked swarm systems under malicious data deception attacks. Int J Robust Nonlinear Contr.\u00a0https:\/\/doi.org\/10.1002\/rnc.7777","DOI":"10.1002\/rnc.7777"},{"issue":"4","key":"745_CR20","doi-asserted-by":"crossref","first-page":"104107","DOI":"10.1016\/j.ipm.2025.104107","volume":"62","author":"J Hao","year":"2025","unstructured":"Hao J et al (2025) Effectively detecting and diagnosing distributed multivariate time series anomalies via unsupervised federated Hypernetwork. Inf Process Manag 62(4):104107","journal-title":"Inf Process Manag"},{"issue":"3","key":"745_CR21","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s42979-021-00557-0","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH, Furhad MH, Nowrozy R (2021) Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 2(3):173","journal-title":"SN Comput Sci"},{"issue":"20","key":"745_CR22","doi-asserted-by":"crossref","first-page":"8525","DOI":"10.3390\/s23208525","volume":"23","author":"S-Y Kim","year":"2023","unstructured":"Kim S-Y, Mukhiddinov M (2023) Data anomaly detection for structural health monitoring based on a convolutional neural network. Sensors 23(20):8525","journal-title":"Sensors"},{"issue":"7","key":"745_CR23","doi-asserted-by":"crossref","first-page":"99","DOI":"10.3390\/technologies12070099","volume":"12","author":"BJ Ospina Cifuentes","year":"2024","unstructured":"Ospina Cifuentes BJ et al (2024) Analysis of the use of artificial intelligence in software-defined intelligent networks: A survey. Technologies 12(7):99","journal-title":"Technologies"},{"issue":"18","key":"745_CR24","doi-asserted-by":"crossref","first-page":"20481","DOI":"10.1007\/s11227-023-05439-1","volume":"79","author":"J Ding","year":"2023","unstructured":"Ding J et al (2023) DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition. J Supercomputing 79(18):20481\u201320514","journal-title":"J Supercomputing"},{"issue":"3","key":"745_CR25","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1007\/s11227-023-05592-7","volume":"80","author":"X Gu","year":"2024","unstructured":"Gu X et al (2024) SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. J Supercomputing 80(3):3382\u20133411","journal-title":"J Supercomputing"},{"key":"745_CR26","doi-asserted-by":"publisher","unstructured":"Li T et al (2021) Finding Spatiotemporal patterns of mobile application usage. IEEE Trans Netw Sci Eng.\u00a0https:\/\/doi.org\/10.1109\/TNSE.2021.3131194","DOI":"10.1109\/TNSE.2021.3131194"},{"issue":"6","key":"745_CR27","doi-asserted-by":"crossref","first-page":"e4049","DOI":"10.1002\/ett.4049","volume":"33","author":"M Papaioannou","year":"2022","unstructured":"Papaioannou M et al (2022) A survey on security threats and countermeasures in internet of medical things (IoMT). Trans Emerg Telecommun Technol 33(6):e4049","journal-title":"Trans Emerg Telecommun Technol"},{"key":"745_CR28","doi-asserted-by":"publisher","unstructured":"Saracoglu D (2023) Metaverse and new cybersecurity threats. In:\u00a0Metaverse: technologies, opportunities and threats. Springer, pp 99\u2013121.\u00a0https:\/\/doi.org\/10.1007\/978-981-99-4641-9_7","DOI":"10.1007\/978-981-99-4641-9_7"},{"issue":"1","key":"745_CR29","first-page":"287","volume":"4","author":"FS Romolo","year":"2023","unstructured":"Romolo FS et al (2023) Health and cybercrime. Eur Rev Digit Adm Law 4(1):287\u2013297","journal-title":"Eur Rev Digit Adm Law"},{"issue":"2","key":"745_CR30","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani A et al (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun Surv Tutorials 21(2):1851\u20131877","journal-title":"IEEE Commun Surv Tutorials"},{"key":"745_CR31","doi-asserted-by":"publisher","unstructured":"Abdi AH et al (2024) Security control and data planes of SDN: A comprehensive review of traditional, AI and MTD approaches to security solutions. IEEE Access.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2024.3393548","DOI":"10.1109\/ACCESS.2024.3393548"},{"issue":"5","key":"745_CR32","doi-asserted-by":"crossref","first-page":"e235","DOI":"10.1002\/spy2.235","volume":"5","author":"N Garg","year":"2022","unstructured":"Garg N et al (2022) Security in IoMT-driven smart healthcare: A comprehensive review and open challenges. Secur Priv 5(5):e235","journal-title":"Secur Priv"},{"issue":"3","key":"745_CR33","first-page":"698","volume":"47","author":"F Cremer","year":"2022","unstructured":"Cremer F et al (2022) Cyber risk and cybersecurity: a systematic review of data availability. The Geneva papers on risk and insurance. Issues Pract 47(3):698","journal-title":"Issues Pract"},{"issue":"4","key":"745_CR34","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1109\/TCSS.2022.3198123","volume":"10","author":"V Ravi","year":"2022","unstructured":"Ravi V, Pham TD, Alazab M (2022) Attention-based multidimensional deep learning approach for cross-architecture IoMT malware detection and classification in healthcare cyber-physical systems. IEEE Trans Comput Social Syst 10(4):1597\u20131606","journal-title":"IEEE Trans Comput Social Syst"},{"issue":"1","key":"745_CR35","doi-asserted-by":"crossref","first-page":"74","DOI":"10.3390\/agriculture12010074","volume":"12","author":"L Huang","year":"2022","unstructured":"Huang L et al (2022) Combining random forest and XGBoost methods in detecting early and mid-term winter wheat Stripe rust using canopy level hyperspectral measurements. Agriculture 12(1):74","journal-title":"Agriculture"},{"key":"745_CR36","doi-asserted-by":"crossref","unstructured":"Saminathan Y, Lourdusamy R (2022) Deep ensemble classifier for ransomware identification using digitalized DNA genotyping system. Int J Intell Eng Syst 15(6).\u00a0https:\/\/inass.org\/wp-content\/uploads\/2022\/07\/2022123145-2.pdf","DOI":"10.22266\/ijies2022.1231.45"},{"key":"745_CR37","doi-asserted-by":"crossref","first-page":"102501","DOI":"10.1016\/j.cose.2021.102501","volume":"112","author":"J-Y Kim","year":"2022","unstructured":"Kim J-Y, Cho S-B (2022) Obfuscated malware detection using deep generative model based on Global\/local features. Computers Secur 112:102501","journal-title":"Computers Secur"},{"key":"745_CR38","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.comcom.2022.08.015","volume":"195","author":"V Ravi","year":"2022","unstructured":"Ravi V et al (2022) A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems. Comput Commun 195:73\u201381","journal-title":"Comput Commun"},{"key":"745_CR39","doi-asserted-by":"publisher","unstructured":"Tripathi S et al (2023) IoMT-Enabled Smart Healthcare: State-of-the-Art, Security and Future Directions. In: 14th International Conference on Information and Knowledge Technology (IKT). 2023. IEEE.\u00a0https:\/\/doi.org\/10.1109\/IKT62039.2023.10433013","DOI":"10.1109\/IKT62039.2023.10433013"},{"issue":"5","key":"745_CR40","first-page":"1502","volume":"5","author":"RK Mahmood","year":"2024","unstructured":"Mahmood RK et al (2024) Optimizing network security with machine learning and Multi-Factor authentication for enhanced intrusion detection. J Rob Control (JRC) 5(5):1502\u20131524","journal-title":"J Rob Control (JRC)"},{"issue":"19","key":"745_CR41","doi-asserted-by":"crossref","first-page":"8107","DOI":"10.3390\/s23198107","volume":"23","author":"CR Bhukya","year":"2023","unstructured":"Bhukya CR et al (2023) Cybersecurity in internet of medical vehicles: State-of-the-Art analysis, research challenges and future perspectives. Sensors 23(19):8107","journal-title":"Sensors"},{"key":"745_CR42","volume-title":"CALRA: practical conditional anonymous and leakage-resilient authentication scheme for vehicular crowdsensing communication","author":"J Xiao","year":"2024","unstructured":"Xiao J et al (2024) CALRA: practical conditional anonymous and leakage-resilient authentication scheme for vehicular crowdsensing communication. IEEE Transactions on Intelligent Transportation Systems"},{"key":"745_CR43","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.future.2023.03.011","volume":"146","author":"F Zhang","year":"2023","unstructured":"Zhang F et al (2023) A blockchain-based security and trust mechanism for AI-enabled IIoT systems. Future Generation Comput Syst 146:78\u201385","journal-title":"Future Generation Comput Syst"},{"key":"745_CR44","doi-asserted-by":"crossref","first-page":"e2264","DOI":"10.7717\/peerj-cs.2264","volume":"10","author":"MR Naeem","year":"2024","unstructured":"Naeem MR et al (2024) Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems. PeerJ Comput Sci 10:e2264","journal-title":"PeerJ Comput Sci"},{"issue":"1","key":"745_CR45","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11277-022-09960-z","volume":"128","author":"UA Butt","year":"2023","unstructured":"Butt UA et al (2023) Cloud security threats and solutions: A survey. Wireless Pers Commun 128(1):387\u2013413","journal-title":"Wireless Pers Commun"},{"issue":"8","key":"745_CR46","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MIM.2024.10743129","volume":"27","author":"MR Naeem","year":"2024","unstructured":"Naeem MR, Amin R (2024) Security emergence framework for Cyber-Physical production systems in the age of industry 4.0. IEEE Instrum Meas Magazine 27(8):3\u201310","journal-title":"IEEE Instrum Meas Magazine"},{"key":"745_CR47","doi-asserted-by":"publisher","unstructured":"Anderson HS, Roth P (2018) Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637.\u00a0https:\/\/doi.org\/10.48550\/arXiv.1804.04637","DOI":"10.48550\/arXiv.1804.04637"},{"key":"745_CR48","doi-asserted-by":"publisher","unstructured":"Yang L et al (2021) BODMAS: an open dataset for learning based Temporal analysis of PE malware. 2021 IEEE security and privacy workshops (SPW). IEEE.\u00a0https:\/\/doi.org\/10.1109\/SPW53761.2021.00020","DOI":"10.1109\/SPW53761.2021.00020"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00745-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00745-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00745-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T01:05:28Z","timestamp":1743469528000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00745-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,1]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["745"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00745-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,1]]},"assertion":[{"value":"1 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"19"}}