{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:26:17Z","timestamp":1767338777830,"version":"3.38.0"},"reference-count":38,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055469","type":"journal-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T07:45:42Z","timestamp":1728891942000},"page":"2395-2436","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network"],"prefix":"10.32604","volume":"81","author":[{"given":"Deema","family":"Alsekait","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Zakariah","sequence":"additional","affiliation":[]},{"given":"Syed Umar","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Zafar Iqbal","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Jehad Saad","family":"Alqurni","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11193142","article-title":"PDF malware detection based on optimizable decision trees","volume":"11","author":"Abu Al-Haija","year":"2022, Art. no. 3142","journal-title":"Electronics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/sym14112304","article-title":"Malware analysis and detection using machine learning algorithms","volume":"14","author":"Akhtar","year":"2022","journal-title":"Symmetry"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3610223","article-title":"A survey of malware analysis using community detection algorithms","volume":"56","author":"Amira","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102490","article-title":"Ransomware: Recent advances, analysis, challenges and future research directions","volume":"111","author":"Beaman","year":"2021, Art. no. 102490","journal-title":"Comput. Secur."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2023\/8227751","article-title":"Metamorphic malware and obfuscation: A survey of techniques, variants, and generation kits","volume":"2023","author":"Brezinski","year":"2023","journal-title":"Secur. Commun. Netw."},{"key":"ref6","article-title":"An efficient boosting-based windows malware family classification system using multi-features fusion","volume":"13","author":"Chen","year":"2023, Art. no. 4060","journal-title":"Appl. Sci."},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.3390\/s23115348","article-title":"Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications","volume":"23","author":"Shafin","year":"2023, Art. no. 5348","journal-title":"Sensors"},{"key":"ref8","article-title":"Android malware analysis in a nutshell","volume":"17","author":"Almomani","year":"Jul. 2022","journal-title":"PLoS One"},{"key":"ref9","first-page":"4320","article-title":"Privacy preservation in cloud based cyber physical systems","volume":"16","author":"Ara","year":"Jan. 2019","journal-title":"American Sci. Pub."},{"key":"ref10","article-title":"MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis","volume":"20","author":"Roy","year":"2023, Art. no. 200283","journal-title":"Intell. Syst. with Appl."},{"key":"ref11","first-page":"333","article-title":"Intelligent deep learning model for privacy preserving IIoT on 6G environment","volume":"72","author":"Hilal","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref12","article-title":"Classification and analysis of malicious code detection techniques based on the APT attack","volume":"13","author":"Lee","year":"2023, Art. no. 2894","journal-title":"Appl. Sci."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-030-13057-2_9","author":"Lee","year":"2019","journal-title":"Deep Learning Applications for Cyber Security. Advanced Sciences and Technologies for Security Applications"},{"key":"ref14","series-title":"2021 Reconcil. Data Anal., Automat., Priv. Secur.: A Big Data Challe. (RDAAPS)","first-page":"1","article-title":"VolMemLyzer: Volatile memory analyzer for malware classification using feature engineering","author":"Lashkari","year":"2021"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2019.07.092","article-title":"Privacy-preserving based task allocation with mobile edge clouds","volume":"507","author":"Qian","year":"2020","journal-title":"Inf. Sci."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"11259","DOI":"10.1007\/s00500-023-08587-x","article-title":"A high-quality feature selection method based on frequent and correlated items for text classification","volume":"27","author":"Farghaly","year":"2023","journal-title":"Soft. Comput."},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-023-00139-y","article-title":"Android malware category detection using a novel feature vector-based machine learning model","volume":"6","author":"Manzil","year":"2023, Art. no. 6","journal-title":"Cybersecurity"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"Z. Li, J. Sun, Q. Yan, W. Srisa-an, and Y. Tsutano, \u201cObfusifier: Obfuscation-resistant android malware detection system,\u201d vol. 304, pp. 214\u2013234, 2019. doi: 10.1007\/978-3-030-37228-6_11.","DOI":"10.1007\/978-3-030-37228-6_11"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.3390\/jsan12010005","article-title":"Effective one-class classifier model for memory dump malware detection","volume":"12","author":"Al-Qudah","year":"2023, Art. no. 5","journal-title":"J. Sens. Actuator Netw."},{"key":"ref20","series-title":"2022 14th Int. Cong. Ultra Modern Telecommun. Cont. Syst. Workshops (ICUMT)","first-page":"110","article-title":"Obfuscated malware detection using dilated convolutional network","author":"Mezina","year":"2022"},{"key":"ref21","series-title":"Proc. 8th Int. Conf. Inf. Syst. Secur. Priv.","first-page":"177","article-title":"Detecting obfuscated malware using memory feature engineering","author":"Carrier","year":"2022"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/sym15111978","article-title":"IoT vulnerabilities and attacks: SILEX malware case study","volume":"15","author":"Mukhtar","year":"2023, Art. no. 1978","journal-title":"Symmetry"},{"key":"ref23","article-title":"An Ensemble approach for advance malware memory analysis using Image classification techniques","volume":"77","author":"Vashishtha","year":"2023, Art. no. 103561","journal-title":"J. Inf. Secur. Appl."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cose.2017.10.007","article-title":"A malware detection method based on family behavior graph","volume":"73","author":"Ding","year":"2018","journal-title":"Comput. Secur."},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"Q. -V. Dang, \u201cEnhancing obfuscated malware detection with machine learning techniques,\u201d vol. 1688, pp. 731\u2013738, 2022. doi: 10.1007\/978-981-19-8069-5.","DOI":"10.1007\/978-981-19-8069-5_54"},{"key":"ref26","series-title":"2023 IEEE International Conference on Telecommunications and Photonics (ICTP)","first-page":"1","article-title":"Obfuscated malware detection: Investigating real-world scenarios through memory analysis","author":"Rakib","year":"2023"},{"key":"ref27","first-page":"1","article-title":"Efficient malware analysis using metric embeddings, digital threats","volume":"5","author":"Rudd","year":"2024","journal-title":"Res. and Pract."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"17481","DOI":"10.1109\/ACCESS.2024.3358840","article-title":"Obfuscated privacy malware classifiers based on memory dumping analysis","volume":"12","author":"Cevallos-Salas","year":"2024","journal-title":"IEEE Access"},{"key":"ref29","series-title":"2020 IEEE Eighth Int. Conf. Commun. Netw. (ComNet)","article-title":"A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs","author":"Mhamdi","year":"2020"},{"key":"ref30","first-page":"206","article-title":"Malware detection using decision tree algorithm based on memory features engineering","volume":"7","author":"Nugraha","year":"2022","journal-title":"J. Appl. Intell. Sys."},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-024-00205-z","article-title":"Enhanced detection of obfuscated malware in memory dumps: A machine learning approach for advanced cybersecurity","volume":"7","author":"Hossain","year":"2024, Art. no. 16","journal-title":"Cybersecurity"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.3390\/math11163477","article-title":"Privacy preservation using machine learning in the internet of things","volume":"11","author":"El-Gendy","year":"2023, Art. no. 3477","journal-title":"Mathematics"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.3390\/app12178604","article-title":"Malware detection using memory analysis data in big data environment","volume":"12","author":"Dener","year":"2022, Art. no. 8604","journal-title":"Appl. Sci."},{"key":"ref34","series-title":"Int. Conf. Cyber Warfare and Secur.","article-title":"Ransomware detection using process memory","author":"Singh","year":"2022"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"122401","DOI":"10.1109\/ACCESS.2024.3451726","article-title":"Intrusion detection in IoT\n\nsystems using denoising autoencoder","volume":"12","author":"Alrayes","year":"2024","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119952","article-title":"Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification","volume":"223","author":"Naeem","year":"2023, Art. no. 119952","journal-title":"Expert. Syst. Appl."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3643563","article-title":"AdverSPAM: Adversarial SPam account manipulation in online social networks","volume":"27","author":"Concone","year":"2024","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103409","article-title":"XMal: A lightweight memory-based explainable obfuscated-malware detector","volume":"133","author":"Alani","year":"2023, Art. no. 103409","journal-title":"Comput. Secur."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_55469\/TSP_CMC_55469.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:10:45Z","timestamp":1741320645000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":38,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055469","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}