{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:48Z","timestamp":1776926328621,"version":"3.51.2"},"reference-count":42,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066551","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T09:00:31Z","timestamp":1752483631000},"page":"4363-4380","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Malware Detection Framework for Internet of Things Applications"],"prefix":"10.32604","volume":"84","author":[{"given":"Muhammad","family":"Adil","sequence":"first","affiliation":[]},{"given":"Mona M.","family":"Jamjoom","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Raff E, Nicholas C. A survey of machine learning methods and challenges for Windows malware classification. arXiv:2006.09271. 2020."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.cose.2018.08.008","article-title":"On the economic significance of ransomware campaigns: a Bitcoin transactions perspective","volume":"79","author":"Conti","year":"2018","journal-title":"Comput Secur"},{"key":"ref3","series-title":"2018 20th International Conference on Advanced Communication Technology (ICACT)","first-page":"153","article-title":"The static analysis of WannaCry ransomware","author":"Hsiao","year":"2018 Feb 11\u201314"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"Kesler E. A transdisciplinary approach to cybersecurity: a framework for encouraging transdisciplinary thinking. arXiv:2405.10373. 2024.","DOI":"10.1145\/3736653"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"e224873","DOI":"10.1001\/jamahealthforum.2022.4873","author":"Neprash","year":"2022","journal-title":"JAMA Health Forum"},{"key":"ref6","series-title":"2022 3rd Asia Conference on Computers and Communications (ACCC)","first-page":"19","article-title":"AASH: a lightweight and efficient static IoT malware detection technique at source code level","author":"Glani","year":"2022 Dec 16\u201318"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","article-title":"Dynamic analysis for IoT malware detection with convolution neural network model","volume":"8","author":"Jeon","year":"2020","journal-title":"IEEE Access"},{"key":"ref8","series-title":"2023 IEEE Conference on Computer Applications (ICCA 2023)","first-page":"329","article-title":"Malware attack detection using machine learning methods for IoT smart devices","author":"Htwe","year":"2023 Feb 27\u201328"},{"key":"ref9","series-title":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","first-page":"51","article-title":"Simbiota++: improved similarity-based IoT malware detection","author":"Buttyan","year":"2022 May 16\u201318"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/TNSE.2023.3292855","article-title":"TransMalDe: an effective transformer-based hierarchical framework for IoT malware detection","volume":"11","author":"Deng","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1109\/TII.2023.3245681","article-title":"A trusted edge computing system based on intelligent risk detection for smart IoT","volume":"20","author":"Deng","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2756","DOI":"10.1109\/JSYST.2023.3238678","article-title":"Obfuscated malware detection in IoT Android applications using Markov images and CNN","volume":"17","author":"Dhanya","year":"2023","journal-title":"IEEE Syst J"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"11343","DOI":"10.1109\/JIOT.2023.3241697","article-title":"GCDroid: android malware detection based on graph compression with reachability relationship extraction for IoT devices","volume":"10","author":"Niu","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"9640","DOI":"10.1109\/JIOT.2021.3135789","article-title":"HADES-IoT: a practical and effective host-based anomaly detection system for IoT devices (extended version)","volume":"9","author":"Breitenbacher","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"6668","DOI":"10.1109\/JIOT.2019.2909745","article-title":"Evedroid: event-aware android malware detection against model degrading for IoT devices","volume":"6","author":"Lei","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/TC.2020.3015584","article-title":"MTHael: cross-architecture IoT malware detection based on neural network advanced ensemble learning","volume":"69","author":"Vasan","year":"2020","journal-title":"IEEE Trans Comput"},{"key":"ref17","series-title":"2019 IEEE 18th International Symposium on Network Computing and Applications (NCA)","first-page":"1","article-title":"Anomalous communications detection in IoT networks using sparse autoencoders","author":"Shahid","year":"2019 Sep 26\u201328"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"4122","DOI":"10.3390\/s24134122","article-title":"Malware detection for Internet of Things using one-class classification","volume":"24","author":"Shi","year":"2024","journal-title":"Sensors"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7838","DOI":"10.1038\/s41598-024-57864-8","article-title":"Deep learning hybridization for improved malware detection in smart Internet of Things","volume":"14","author":"Almazroi","year":"2024","journal-title":"Sci Rep"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.3390\/math12101437","article-title":"A hybrid optimization model for efficient detection and classification of malware in the Internet of Things","volume":"12","author":"Ahmad","year":"2024","journal-title":"Mathematics"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"109483","DOI":"10.1016\/j.compeleceng.2024.109483","article-title":"CloudIntellMal: an advanced cloud based intelligent malware detection framework to analyze android applications","volume":"119","author":"Mishra","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10207-022-00631-5","article-title":"A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network","volume":"22","author":"Sharma","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"123109","DOI":"10.1016\/j.eswa.2023.123109","article-title":"A malware detection model based on imbalanced heterogeneous graph embeddings","volume":"246","author":"Li","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"9355","DOI":"10.1007\/s12652-023-04603-y","article-title":"Advanced persistent threats (APT): evolution, anatomy, attribution and countermeasures","volume":"14","author":"Sharma","year":"2023","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1007\/s10586-022-03618-y","article-title":"HeuCRIP: a malware detection approach for Internet of Battlefield Things","volume":"26","author":"Shah","year":"2023","journal-title":"Cluster Comput"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"108731","DOI":"10.1016\/j.compeleceng.2023.108731","article-title":"AI-empowered malware detection system for Industrial Internet of Things","volume":"108","author":"Smmarwar","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"8448","DOI":"10.1109\/JIOT.2023.3318290","article-title":"An automatic and efficient malware traffic classification method for secure Internet of Things","volume":"11","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"708","DOI":"10.3390\/electronics12030708","article-title":"Optimized and efficient image-based IoT malware detection method","volume":"12","author":"El-Ghamry","year":"2023","journal-title":"Electronics"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"26826","DOI":"10.1109\/JIOT.2023.3298663","article-title":"A GNN-based adversarial Internet of Things malware detection framework for critical infrastructure: studying Gafgyt, Mirai and Tsunami campaigns","volume":"11","author":"Esmaeili","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"5348","DOI":"10.3390\/s23115348","article-title":"Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications","volume":"23","author":"Shafin","year":"2023","journal-title":"Sensors"},{"key":"ref31","series-title":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC 2023)","first-page":"553","article-title":"Ransomware attack detection in the Internet of Things using machine learning approaches","author":"Sharma","year":"2023 May 4\u20136"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"100117","DOI":"10.1016\/j.hcc.2023.100117","article-title":"Enhancement of IoT device security using an improved elliptic curve cryptography algorithm and malware detection utilizing deep LSTM","volume":"3","author":"Devi","year":"2023","journal-title":"High-Confidence Comput"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"22","DOI":"10.58496\/MJCS\/2023\/005","article-title":"Threats detection in the Internet of Things using convolutional neural networks, long short-term memory, and gated recurrent units","volume":"2023","author":"Bajao","year":"2023","journal-title":"Mesopotamian J Cyber"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1049\/cit2.12200","article-title":"Adaptive secure malware efficient machine learning algorithm for healthcare data","author":"Mohammed","year":"2023","journal-title":"CAAI Trans Intell Technol"},{"key":"ref35","author":"Dzulqarnain","year":"2019","journal-title":"Investigating IoT malware characteristics to improve network security [master\u2019s thesis]"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"25696","DOI":"10.1109\/ACCESS.2022.3155695","article-title":"A malware detection approach using autoencoder in deep learning","volume":"10","author":"Xing","year":"2022","journal-title":"IEEE Access"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"80","DOI":"10.22581\/muet1982.2201.08","article-title":"Malware detection and classification in IoT network using ANN","volume":"41","author":"Jamal","year":"2022","journal-title":"Mehran Univ Res J Eng Technol"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"106432","DOI":"10.1016\/j.engappai.2023.106432","article-title":"Towards a machine learning-based framework for DDoS attack detection in software-defined IoT (SD-IoT) networks","volume":"123","author":"Bhayo","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.future.2023.10.011","article-title":"Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification","volume":"152","author":"Sanchez","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","article-title":"Internet of Things attack detection using hybrid deep learning model","volume":"176","author":"Sahu","year":"2021","journal-title":"Comput Commun"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TNSE.2020.2996379","article-title":"SedmDroid: an enhanced stacking ensemble framework for Android malware detection","volume":"8","author":"Zhu","year":"2020","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"100056","DOI":"10.1016\/j.fraope.2023.100056","article-title":"Optimized machine learning enabled intrusion detection system for Internet of Medical Things","volume":"6","author":"Sun","year":"2024","journal-title":"Franklin Open"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66551\/TSP_CMC_66551.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:21Z","timestamp":1776923121000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066551","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}