{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T03:22:29Z","timestamp":1774236149073,"version":"3.50.1"},"reference-count":36,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068257","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T08:19:23Z","timestamp":1757924363000},"page":"5287-5307","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":9,"title":["Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things"],"prefix":"10.32604","volume":"85","author":[{"given":"Yahya Alhaj","family":"Maz","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[]},{"given":"Mosleh M.","family":"Abualhaj","sequence":"additional","affiliation":[]},{"given":"Sultan Ahmed","family":"Almalki","sequence":"additional","affiliation":[]},{"given":"Basim Ahmad","family":"Alabsi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"6507","DOI":"10.3390\/s23146507","article-title":"CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on Internet of Things networks","volume":"23","author":"Ahmad Alabsi","year":"2023","journal-title":"Sensors"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/s22093400","article-title":"A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things","volume":"22","author":"Al-Amiedy","year":"2022","journal-title":"Sensors"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","article-title":"Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues","volume":"144","author":"\u010colakovi\u0107","year":"2018","journal-title":"Comput Netw"},{"key":"ref4","series-title":"2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET); 2019 Jan 30\u201331","first-page":"1","article-title":"A novel approach of unprivileged keylogger detection","author":"Wajahat"},{"key":"ref5","series-title":"2022 International Conference on Futuristic Technologies (INCOFT); 2022 Nov 25\u201327","first-page":"1","article-title":"Multiple botnet and keylogger attack detection using CNN in IoT networks","author":"Ananthu Suresh"},{"key":"ref6","unstructured":"Hitachi Group. Information security report. [cited 2025 Aug 1]. Available from: https:\/\/www.hitachi.com\/sustainability\/download\/pdf\/securityreport.pdf."},{"key":"ref7","unstructured":"George G, Keith W. Q4 2024 cyber threat landscape: gone phishing. evolving techniques keep organizations on the hook. Cyber threat intelligence reports. New York, NY, USA: Kroll Corporation. [cited 2025 Aug 1]. Available from: https:\/\/www.kroll.com\/en\/insights\/publications\/cyber\/threat-intelligence-reports."},{"key":"ref8","unstructured":"Rob S. 157 cybersecurity statistics and trends. New York, NY, USA: Varonis Corporation. [cited 2025 Aug 1]. Available from: https:\/\/www.varonis.com\/blog\/cybersecurity-statistics."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","article-title":"A comprehensive survey on transfer learning","volume":"109","author":"Zhuang","year":"2021","journal-title":"Proc IEEE"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"103760","DOI":"10.1016\/j.jnca.2023.103760","article-title":"Deep transfer learning for intrusion detection in industrial control networks: a comprehensive review","volume":"220","author":"Kheddar","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3390\/technologies11020040","article-title":"A review of deep transfer learning and recent advancements","volume":"11","author":"Iman","year":"2023","journal-title":"Technologies"},{"key":"ref12","series-title":"27th International Conference on Artificial Neural Networks; 2018 Oct 4\u20137","first-page":"270","article-title":"A survey on deep transfer learning","author":"Tan"},{"key":"ref13","series-title":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12\u201317","first-page":"2058","article-title":"Return of frustratingly easy domain adaptation","author":"Sun"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1016\/j.compeleceng.2018.03.005","article-title":"Network traffic classification based on transfer learning","volume":"69","author":"Sun","year":"2018","journal-title":"Comput Electr Eng"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1186\/s40537-019-0272-6","article-title":"Using transfer learning for smart building management system","volume":"6","author":"Pardamean","year":"2019","journal-title":"J Big Data"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.3390\/computers10070088","article-title":"Using autoencoders for anomaly detection and transfer learning in IoT","volume":"10","author":"Tien","year":"2021","journal-title":"Computers"},{"key":"ref17","first-page":"1059","article-title":"Accelerating the update of a DL-based IDS for IoT using deep transfer learning","volume":"23","author":"Idrissi","year":"2021","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.3390\/s22155621","article-title":"Transfer-learning-based intrusion detection framework in IoT networks","volume":"22","author":"Rodr\u00edguez","year":"2022","journal-title":"Sensors"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"244","DOI":"10.59543\/ijmscs.v2i.10377","article-title":"Enhancing intrusion detection in wireless sensor networks through machine learning techniques and context awareness integration","volume":"2","author":"Ahmed","year":"2024","journal-title":"Int J Math Stat Comput Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1186\/s13635-017-0059-2","article-title":"An artificial immunity approach to malware detection in a mobile platform","volume":"2017","author":"Brown","year":"2017","journal-title":"EURASIP J Inf Secur"},{"key":"ref21","first-page":"707","article-title":"A modified framework to detect keyloggers using machine learning algorithm","volume":"11","author":"Pillai","year":"2019","journal-title":"Int J Inf Technol"},{"key":"ref22","series-title":"2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC); 2019 Dec 1\u20133","first-page":"256","article-title":"Deep learning-based intrusion detection for IoT networks","author":"Ge"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4405","DOI":"10.1109\/TIFS.2021.3096029","article-title":"A transfer learning approach for securing resource-constrained IoT devices","volume":"16","author":"Yilmaz","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/TII.2022.3164770","article-title":"Dependable intrusion detection system for IoT: a deep transfer learning based approach","volume":"19","author":"Mehedi","year":"2023","journal-title":"IEEE Trans Ind Inf"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"8578","DOI":"10.1109\/JIOT.2022.3202029","article-title":"Deep transfer learning: a novel collaborative learning model for cyberattack detection systems in IoT networks","volume":"10","author":"Khoa","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"55","DOI":"10.31449\/inf.v48i12.5955","article-title":"A deep transfer learning framework for robust IoT attack detection","volume":"48","author":"Mohammed","year":"2024","journal-title":"Informatica"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","article-title":"Deep transfer learning for IoT attack detection","volume":"8","author":"Vu","year":"2020","journal-title":"IEEE Access"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"151482","DOI":"10.1109\/ACCESS.2019.2947701","article-title":"Combining multiple feature-ranking techniques and clustering of variables for feature selection","volume":"7","author":"Haq","year":"2019","journal-title":"IEEE Access"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.inffus.2018.11.008","article-title":"Ensembles for feature selection: a review and future trends","volume":"52","author":"Bol\u00f3n-Canedo","year":"2019","journal-title":"Inf Fusion"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","article-title":"Attack classification using feature selection techniques: a comparative study","volume":"12","author":"Thakkar","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-031-62624-1_4","author":"Albaser","year":"2024","journal-title":"Information and communications technologies"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"4971","DOI":"10.3390\/s23104971","article-title":"An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things","volume":"23","author":"Alalhareth","year":"2023","journal-title":"Sensors"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"e12553","DOI":"10.1111\/exsy.12553","article-title":"Ensemble feature selection in medical datasets: combining filter, wrapper, and embedded feature selection results","volume":"37","author":"Chen","year":"2020","journal-title":"Expert Syst"},{"key":"ref34","author":"Duc-Minh","year":"2023","journal-title":"Lecture notes on data engineering and communications technologies"},{"key":"ref35","unstructured":"BoT IoT Dataset. [cited 2025 Aug 1]. Available from: https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset."},{"key":"ref36","unstructured":"Keylogger detection. Dataset. [cited 2025 Aug 1]. Available from: https:\/\/www.kaggle.com\/datasets\/subhajournal\/keylogger-Detection."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_68257\/TSP_CMC_68257.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:22:08Z","timestamp":1763346128000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068257","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}