{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T11:25:43Z","timestamp":1768217143396,"version":"3.49.0"},"reference-count":162,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The proliferation of Internet of Things (IoT) devices has significantly expanded the threat landscape for malicious software (malware), rendering traditional signature-based detection methods increasingly ineffective in coping with the volume and evolving nature of modern threats. In response, researchers are utilising artificial intelligence (AI) for a more dynamic and robust malware detection solution. An innovative approach utilising AI is focusing on image classification techniques to detect malware on resource-constrained Single-Board Computers (SBCs) such as the Raspberry Pi. In this method the conversion of malware binaries into 2D images is examined, which can be analysed by deep learning models such as convolutional neural networks (CNNs) to classify them as benign or malicious. The results show that the image-based approach demonstrates high efficacy, with many studies reporting detection accuracy rates exceeding 98%. That said, there is a significant challenge in deploying these demanding models on devices with limited processing power and memory, in particular those involving of both calculation and time complexity. Overcoming this issue requires critical model optimisation strategies. Successful approaches include the use of a lightweight CNN architecture and federated learning, which may be used to preserve privacy while training models with decentralised data are processed. This hybrid workflow in which models are trained on powerful servers before the learnt algorithms are deployed on SBCs is an emerging field attacting significant interest in the field of cybersecurity. This paper synthesises the current state of the art, performance compromises, and optimisation techniques contributing to the understanding of how AI and image representation can enable effective low-cost malware detection on resource-constrained systems.<\/jats:p>","DOI":"10.3390\/fi18010046","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T08:20:37Z","timestamp":1768206037000},"page":"46","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6611-6812","authenticated-orcid":false,"given":"Phil","family":"Steadman","sequence":"first","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0026-8360","authenticated-orcid":false,"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4571-1888","authenticated-orcid":false,"given":"Rajkumar Singh","family":"Rathore","sequence":"additional","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7593-6661","authenticated-orcid":false,"given":"Chaminda","family":"Hewage","sequence":"additional","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"key":"ref_1","unstructured":"Scheldt, A. (2023, November 16). 7 Most Common Types of Malware. Available online: https:\/\/www.comptia.org\/blog\/7-most-common-types-of-malware."},{"key":"ref_2","unstructured":"Celdr\u00e1n, A.H., S\u00e1nchez, P.M.S., von der Assen, J., Schenk, T., Bovet, G., P\u00e9rez, G.M., and Stiller, B. (2022). RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT. arXiv."},{"key":"ref_3","unstructured":"Mistry, S., and Pajak, D. (2024, February 04). Get Started With Machine Learning on Arduino|Arduino Documentation. Available online: https:\/\/docs.arduino.cc\/tutorials\/nano-33-ble-sense\/get-started-with-machine-learning\/."},{"key":"ref_4","unstructured":"Mueller, J.P., and Stephens, R. (2022). Machine Learning Security Principles: Keep Data, Networks, Users, and Applications Safe from Prying Eyes, Packt Publishing."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hemalatha, J., Roseline, S.A., Geetha, S., Kadry, S., and Dama\u0161evi\u010dius, R. (2021). An Efficient DenseNet-Based Deep Learning Model for Malware Detection. Entropy, 23.","DOI":"10.3390\/e23030344"},{"key":"ref_6","first-page":"20","article-title":"A Study on Malware and Malware Detection Techniques","volume":"8","author":"Tahir","year":"2018","journal-title":"Int. J. Educ. Manag. Eng."},{"key":"ref_7","unstructured":"Scott, J. (2017). Signature Based Malware Detection Is Dead, Institute for Critical Infrastructure Technology."},{"key":"ref_8","unstructured":"French, R., Smith, A., Robinson, M., and Jenkins, P. (2025, November 02). Initial Video Conference with Airbus. 2023. (Video Call Via Skype). Available online: https:\/\/meet.google.com\/pup-jbks-chs."},{"key":"ref_9","unstructured":"(2023, November 16). Cuckoo. Available online: https:\/\/cuckoosandbox.org\/."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Djenna, A., Bouridane, A., Rubab, S., and Marou, I.M. (2023). Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation. Symmetry, 15.","DOI":"10.3390\/sym15030677"},{"key":"ref_11","unstructured":"Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X., and Wang, X. (2009, January 10\u201314). Effective and Efficient Malware Detection at the End Host. Proceedings of the 18th Usenix Security Symposium, Montreal, QC, Canada."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rabadi, D., and Teo, S.G. (2020, January 7\u201311). Advanced Windows Methods on Malware Detection and Classification. Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA.","DOI":"10.1145\/3427228.3427242"},{"key":"ref_13","unstructured":"Schultz, M., Eskin, E., Zadok, F., and Stolfo, S. (2001, January 14\u201316). Data Mining Methods for Detection of New Malicious Executables. Proceedings of the Proceedings 2001 IEEE Symposium on Security and Privacy, S&P 2001, Oakland, CA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., and Maloof, M.A. (2004, January 22\u201325). Learning to Detect Malicious Executables in the Wild. Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, WA, USA.","DOI":"10.1145\/1014052.1014105"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., and Bryant, R. (2005, January 8\u201311). Semantics-Aware Malware Detection. Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P\u201905), Oakland, CA, USA.","DOI":"10.1109\/SP.2005.20"},{"key":"ref_16","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., and Kirda, E. (2009, January 8\u201311). Scalable, Behavior-Based Malware Clustering. Proceedings of the 16th Annual Network and Distributed System Security (NDSS) Symposium 2009, San Diego, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","article-title":"Automated Classification and Analysis of Internet Malware","volume":"Volume 4637","author":"Kruegel","year":"2007","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","article-title":"Automatic Analysis of Malware Behavior Using Machine Learning","volume":"19","author":"Rieck","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","article-title":"Opcode Sequences as Representation of Executables for Data-Mining-Based Unknown Malware Detection","volume":"231","author":"Santos","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Saxe, J., and Berlin, K. (2015, January 20\u201322). Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features. Proceedings of the 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA.","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref_21","first-page":"137","article-title":"Deep Learning for Classification of Malware System Call Sequences","volume":"Volume 9992","author":"Kang","year":"2016","journal-title":"AI 2016: Advances in Artificial Intelligence"},{"key":"ref_22","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., and Nicholas, C. (2017). Malware Detection by Eating a Whole EXE. arXiv."},{"key":"ref_23","unstructured":"Anderson, H.S., and Roth, P. (2018). EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"102526","DOI":"10.1016\/j.jnca.2019.102526","article-title":"The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges","volume":"153","author":"Gibert","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Naeem, H., Guo, B., and Naeem, M.R. (2018, January 26\u201328). A Light-Weight Malware Static Visual Analysis for IoT Infrastructure. Proceedings of the 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China.","DOI":"10.1109\/ICAIBD.2018.8396202"},{"key":"ref_26","unstructured":"Catak, F.O., and Yaz\u0131, A.F. (2021). A Benchmark API Call Dataset for Windows PE Malware Classification. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kalash, M., Rochan, M., Mohammed, N., Bruce, N.D.B., Wang, Y., and Iqbal, F. (2018, January 26\u201328). Malware Classification with Deep Convolutional Neural Networks. Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref_28","unstructured":"Hei, Y., Yang, R., Peng, H., Wang, L., Xu, X., Liu, J., Liu, H., Xu, J., and Sun, L. (2021). HAWK: Rapid Android Malware Detection through Heterogeneous Graph Attention Networks. arXiv."},{"key":"ref_29","unstructured":"Marais, B., Quertier, T., and Morucci, S. (2022). AI-based Malware and Ransomware Detection Models. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Akhtar, M.S., and Feng, T. (2023). Evaluation of Machine Learning Algorithms for Malware Detection. Sensors, 23.","DOI":"10.3390\/s23020946"},{"key":"ref_31","unstructured":"Kasarapu, S., Shukla, S., Hassan, R., Sasan, A., Homayoun, H., and Dinakarrao, S.M.P. (2024). Generative AI-Based Effective Malware Detection for Embedded Computing Systems. arXiv."},{"key":"ref_32","first-page":"200472","article-title":"Detecting New Obfuscated Malware Variants: A Lightweight and Interpretable Machine Learning Approach","volume":"25","author":"Madamidola","year":"2025","journal-title":"Intell. Syst. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1007\/s42979-024-03024-8","article-title":"Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection","volume":"5","author":"Bena","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"61611","DOI":"10.1109\/ACCESS.2025.3555926","article-title":"Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges","volume":"13","author":"Manthena","year":"2025","journal-title":"IEEE Access"},{"key":"ref_35","unstructured":"DellTechnologies (2023, November 30). Internet of Things and Data Placement|Edge to Core and the Internet of Things|Dell Technologies Info Hub. Available online: https:\/\/infohub.delltechnologies.com\/l\/edge-to-core-and-the-internet-of-things-2\/internet-of-things-and-data-placement\/."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2023764","DOI":"10.1080\/17517575.2021.2023764","article-title":"A Comprehensive Survey on Machine Learning Approaches for Malware Detection in IoT-based Enterprise Information System","volume":"17","author":"Gaurav","year":"2023","journal-title":"Enterp. Inf. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"e4","DOI":"10.4108\/eetsc.v6i18.2345","article-title":"Raspberry Pi-based Intelligent Cyber Defense Systems for SMEs and Smart-homes: An Exploratory Study","volume":"6","author":"Tirumala","year":"2022","journal-title":"EAI Endorsed Trans. Smart Cities"},{"key":"ref_38","unstructured":"Raywood, D. (2023, December 03). Thermostat Hacked to Run Ransomware. Available online: https:\/\/www.infosecurity-magazine.com\/news\/defcon-thermostat-control-hacked\/."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"von der Assen, J., Celdr\u00e1n, A.H., Luechinger, J., S\u00e1nchez, P.M.S., Bovet, G., P\u00e9rez, G.M., and Stiller, B. (2023). RansomAI: AI-powered Ransomware for Stealthy Encryption. arXiv.","DOI":"10.1109\/GLOBECOM54140.2023.10437393"},{"key":"ref_40","unstructured":"Cameron, L. (2023, December 03). Lindy Cameron at Singapore International Cyber Week, Available online: https:\/\/www.ncsc.gov.uk\/speech\/lindy-cameron-singapore-international-cyber-week."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"64411","DOI":"10.1109\/ACCESS.2019.2916886","article-title":"A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features","volume":"7","author":"Kumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_42","first-page":"6156","article-title":"Artificial Intelligence in Terms of Spotting Malware and Delivering Cyber Risk Management","volume":"6","author":"Jakka","year":"2022","journal-title":"J. Posit. Sch. Psychol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"108693","DOI":"10.1016\/j.comnet.2021.108693","article-title":"Federated Learning for Malware Detection in IoT Devices","volume":"204","author":"Rey","year":"2022","journal-title":"Comput. Networks"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Bose, S., Barao, T., and Liu, X. (2020, January 19\u201324). Explaining AI for Malware Detection: Analysis of Mechanisms of MalConv. Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207322"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"McCarthy, J. (2007). What Is Artificial Intelligence?, Stanford University.","DOI":"10.1145\/1283920.1283926"},{"key":"ref_46","unstructured":"Addley, E. (2023, November 14). AI\u2019 Named Most Notable Word of 2023 by Collins Dictionary, The Guardian, Available online: https:\/\/www.theguardian.com\/technology\/2023\/nov\/01\/ai-named-most-notable-word-of-2023-by-collins-dictionary."},{"key":"ref_47","unstructured":"(2023, November 14). What Is Strong AI?|IBM. Available online: https:\/\/www.ibm.com\/topics\/strong-ai."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"eadi2336","DOI":"10.1126\/science.adi2336","article-title":"Learning Skillful Medium-Range Global Weather Forecasting","volume":"382","author":"Lam","year":"2023","journal-title":"Science"},{"key":"ref_49","unstructured":"(2023, November 15). IBM Watson. Available online: https:\/\/www.ibm.com\/watson."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5121\/ijwmn.2023.15602","article-title":"Malware Detection in IoT Systems Using Machine Learning Techniques","volume":"15","author":"Mehrban","year":"2023","journal-title":"Int. J. Wirel. Mob. Networks"},{"key":"ref_51","unstructured":"Foote, K.D. (2025, February 07). A Brief History of the Internet of Things. Available online: https:\/\/www.dataversity.net\/brief-history-internet-things\/."},{"key":"ref_52","unstructured":"Smith, S. (2025, February 07). 5G IoT Connections to Surpass 100 Million for First Time Globally by 2026|Press. Available online: https:\/\/www.juniperresearch.com\/press\/5g-iot-connections-to-surpass-100-mn\/."},{"key":"ref_53","unstructured":"Sinha, S. (2025, February 07). State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally. Available online: https:\/\/iot-analytics.com\/number-connected-iot-devices\/."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Vignau, B., Khoury, R., and Hall\u00e9, S. (2019, January 22\u201326). 10 Years of IoT Malware: A Feature-Based Taxonomy. Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria.","DOI":"10.1109\/QRS-C.2019.00088"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Syarif, A.R., and Gata, W. (2017, January 31). Intrusion Detection System Using Hybrid Binary PSO and K-nearest Neighborhood Algorithm. Proceedings of the 2017 11th International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia.","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"ref_56","unstructured":"Alrawi, O., Lever, C., Valakuzhy, K., Court, R., Snow, K., Monrose, F., and Antonakakis, M. (2021). The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle, Georgia Tech."},{"key":"ref_57","unstructured":"Hammond, J. (2025, February 20). Available online: https:\/\/www.youtube.com\/watch?v=sznUqJHlzUo."},{"key":"ref_58","unstructured":"Staff, A. (2024, August 04). Five Most Famous DDoS Attacks and Then Some. Available online: https:\/\/www.a10networks.com\/blog\/5-most-famous-ddos-attacks\/."},{"key":"ref_59","first-page":"1421","article-title":"Machine Learning Aided Malware Detection for Secure and Smart Manufacturing: A Comprehensive Analysis of the State of the Art","volume":"18","author":"Rani","year":"2024","journal-title":"Int. J. Interact. Des. Manuf. IJIDeM"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Carrillo-Mondejar, J., Suarez-Tangil, G., Costin, A., and Rodr\u00edguez, R.J. (2024, January 27\u201328). Exploring Shifting Patterns in Recent IoT Malware. Proceedings of the 23rd European Conference on Cyber Warfare and Security, Jyvaskyla, Finland.","DOI":"10.34190\/eccws.23.1.2280"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.1109\/TDSC.2020.3037908","article-title":"A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices","volume":"19","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Sforzin, A., M\u00e1rmol, F.G., Conti, M., and Bohli, J.M. (2016, January 18\u201321). RPiDS: Raspberry Pi IDS\u2014A Fruitful Intrusion Detection System for IoT. Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), Toulouse, France.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080"},{"key":"ref_63","unstructured":"Toubba, K. (2025, February 20). Security Incident December 2022 Update\u2014LastPass\u2014The LastPass Blog. Available online: https:\/\/blog.lastpass.com\/posts\/notice-of-recent-security-incident."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (2017, January 10\u201311). Security Attacks in IoT: A Survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref_65","unstructured":"NCSC (2025, March 03). Cloud Security Shared Responsibility Model, Available online: https:\/\/www.ncsc.gov.uk\/collection\/cloud\/understanding-cloud-services\/cloud-security-shared-responsibility-model."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"38","DOI":"10.26480\/jtin.01.2023.38.43","article-title":"IOT device security risks: A comprehensive overview and mitigation strategies","volume":"3","author":"Iwuanyanwu","year":"2023","journal-title":"J. Technol. Innov."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Chadler, S., Davis, S., Delacroix, T., and Carrington, W. (2024). Ransomware Detection Using Multi-Vector Anomaly Profiling for Maximum Security. Res. Sq., preprint.","DOI":"10.21203\/rs.3.rs-5452210\/v1"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1109\/COMST.2017.2749442","article-title":"Botnet Communication Patterns","volume":"19","author":"Vormayr","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_69","unstructured":"IoT Business News (2025, March 03). IoT Meets Bitcoin: How Smart Devices Are Mining Cryptocurrency. Available online: https:\/\/iotbusinessnews.com\/2024\/03\/15\/13225-iot-meets-bitcoin-how-smart-devices-are-mining-cryptocurrency\/."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.icte.2020.04.005","article-title":"A Survey of IoT Malware and Detection Methods Based on Static Features","volume":"6","author":"Ngo","year":"2020","journal-title":"ICT Express"},{"key":"ref_71","unstructured":"Gaydos, B. (2025, March 17). Defending Against IoT Threats: A Comprehensive Guide to IoT Malware Protection. Available online: https:\/\/duplocloud.com\/blog\/defending-against-iot-threats-a-comprehensive-guide-to-iot-malware-protection\/."},{"key":"ref_72","unstructured":"McCart, C. (2025, March 17). What Is IoT Malware? Threats to Your Smart Home Security. Available online: https:\/\/www.comparitech.com\/antivirus\/what-is-iot-malware-and-how-can-you-secure-your-smart-home\/."},{"key":"ref_73","first-page":"634","article-title":"Implications of the WannnaCry Ransomware Attack on Personal Security: Analysis of Human Security Concepts","volume":"1","author":"Amelia","year":"2025","journal-title":"PROIROFONIC"},{"key":"ref_74","unstructured":"Secarma (2025, March 17). The Growing Threat of IoT Cyber-Attacks\u2014What You Need to Know. Secarma: Penetration Testing and Cybersecurity Company. Available online: https:\/\/secarma.com\/the-growing-threat-of-iot-cyber-attacks."},{"key":"ref_75","unstructured":"Portnox (2025, March 17). Exploring IoT Attacks. Available online: https:\/\/www.portnox.com\/cybersecurity-101\/iot-attacks\/."},{"key":"ref_76","unstructured":"Pawar, D.S. (2025, March 17). IoT Attack Surge: Threats and Security Solutions|EC-Council. Available online: https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/the-rise-of-iot-attacks-endpoint-protection-via-trending-technologies\/."},{"key":"ref_77","unstructured":"Morgunov, V., and Shmelev, Y. (2025, March 17). IoT Threats in 2023. Available online: https:\/\/securelist.com\/iot-threat-report-2023\/110644\/."},{"key":"ref_78","unstructured":"Asimily (2025, March 17). The Top Internet of Things (IoT) Cybersecurity Breaches in 2024. Available online: https:\/\/asimily.com\/blog\/the-top-internet-of-things-iot-cybersecurity-breaches-in-2024\/."},{"key":"ref_79","unstructured":"Lazurca, F. (2025, March 17). Top 10 Vulnerabilities That Make IoT Devices Insecure. Available online: https:\/\/www.cyberark.com\/resources\/blog\/top-10-vulnerabilities-that-make-iot-devices-insecure."},{"key":"ref_80","unstructured":"Olaes, T. (2025, March 17). Top IoT Security Challenges and Best Practices. Available online: https:\/\/www.balbix.com\/insights\/addressing-iot-security-challenges\/."},{"key":"ref_81","unstructured":"Illing, D. (2025, March 17). Common Cyber-Attacks in the IoT. Available online: https:\/\/www.globalsign.com\/en\/blog\/common-cyber-attacks-in-the-iot."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1109\/TC.2016.2540634","article-title":"Hardware-Based Malware Detection Using Low-Level Architectural Features","volume":"65","author":"Ozsoy","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Casado-Vara, R., Severt, M., D\u00edaz-Longueira, A., Rey, \u00c1.M.D., and Calvo-Rolle, J.L. (2024). Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach. Mathematics, 12.","DOI":"10.3390\/math12020250"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","article-title":"Diversification and Obfuscation Techniques for Software Security: A Systematic Literature Review","volume":"104","author":"Hosseinzadeh","year":"2018","journal-title":"Inf. Softw. Technol."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1109\/TMC.2018.2866249","article-title":"Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics","volume":"18","author":"Sivanathan","year":"2019","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., and Ray, I. (2018, January 15\u201319). Behavioral Fingerprinting of IoT Devices. Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, Toronto, ON, Canada.","DOI":"10.1145\/3266444.3266452"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Djenna, A. (2021). Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure. Appl. Sci., 11.","DOI":"10.3390\/app11104580"},{"key":"ref_88","first-page":"455","article-title":"A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges","volume":"2","author":"Sasi","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","article-title":"Advancing IoT Security: A Systematic Review of Machine Learning Approaches for the Detection of IoT Botnets","volume":"35","author":"Nazir","year":"2023","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Mazhar, T., Talpur, D.B., Shloul, T.A., Ghadi, Y.Y., Haq, I., Ullah, I., Ouahada, K., and Hamam, H. (2023). Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci., 13.","DOI":"10.3390\/brainsci13040683"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Shukla, S., Dhavlle, A., D, S.M.P., Homayoun, H., and Rafatirad, S. (2022, January 23\u201326). Iron-Dome: Securing IoT Networked Systems at Runtime by Network and Device Characteristics to Confine Malware Epidemics. Proceedings of the 2022 IEEE 40th International Conference on Computer Design (ICCD), Olympic Valley, CA, USA.","DOI":"10.1109\/ICCD56317.2022.00046"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","article-title":"Physical Unclonable Functions","volume":"3","author":"Gao","year":"2020","journal-title":"Nat. Electron."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Alasmary, H., Khormali, A., Anwar, A., Park, J., Choi, J., Nyang, D., and Mohaisen, A. (2019). Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach. arXiv.","DOI":"10.1109\/JIOT.2019.2925929"},{"key":"ref_94","unstructured":"Jackson, F. (2024, July 08). Google\u2019s Emissions Increased by 48% Since 2019, Thanks to AI Pursuits. Available online: https:\/\/www.techrepublic.com\/article\/google-ai-environmental-impact\/."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1007\/s12083-023-01478-w","article-title":"IoT Malware: An Attribute-Based Taxonomy, Detection Mechanisms and Challenges","volume":"16","author":"Victor","year":"2023","journal-title":"Peer-Netw. Appl."},{"key":"ref_96","unstructured":"HP (2024, July 08). The Internet of (Insecure) Things. Available online: https:\/\/h41382.www4.hpe.com\/gfs-shared\/downloads-352.pdf."},{"key":"ref_97","first-page":"1","article-title":"Intrusion Detection System (IDS) &Intrusion Prevention System (IPS): Case Study","volume":"2","author":"Ashoor","year":"2011","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3906\/elk-2011-31","article-title":"A New Classification Method for Encrypted Internet Traffic Using Machine Learning","volume":"29","author":"Arslan","year":"2021","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"ref_99","unstructured":"Ledesma, J. (2023, December 03). IDS vs. IPS: What Organizations Need to Know. Available online: https:\/\/www.varonis.com\/blog\/ids-vs-ips."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Parkar, P. (2021, January 26\u201328). A Network Intrusion Detection System Based on Ensemble Machine Learning Techniques. Proceedings of the 2021 IEEE 2nd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC), Bhubaneswar, India.","DOI":"10.1109\/AESPC52704.2021.9708502"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/SURV.2011.092311.00082","article-title":"Evasion Techniques: Sneaking through Your Intrusion Detection\/Prevention Systems","volume":"14","author":"Cheng","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"K\u0131l\u0131\u00e7, H., Katal, N.S., and Sel\u00e7uk, A.A. (2019, January 11\u201315). Evasion Techniques Efficiency Over The IPS\/IDS Technology. Proceedings of the 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey.","DOI":"10.1109\/UBMK.2019.8907177"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"87816","DOI":"10.1109\/ACCESS.2019.2925639","article-title":"Detection and Recognition of Atomic Evasions Against Network Intrusion Detection\/Prevention Systems","volume":"7","author":"Jia","year":"2019","journal-title":"IEEE Access"},{"key":"ref_104","unstructured":"LeCun, Y., Cortes, C., and Burges, C.J. (2010). MNIST Handwritten Digit Database, ATT Labs. Available online: http:\/\/yann.lecun.com\/exdb\/mnist."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Baldominos, A., Saez, Y., and Isasi, P. (2019). A Survey of Handwritten Character Recognition with MNIST and EMNIST. Appl. Sci., 9.","DOI":"10.3390\/app9153169"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"012097","DOI":"10.1088\/1755-1315\/428\/1\/012097","article-title":"Improvement of MNIST Image Recognition Based on CNN","volume":"428","author":"Wang","year":"2020","journal-title":"IOP Conf. Ser. Earth Environ. Sci."},{"key":"ref_107","unstructured":"Wu, M., and Chen, L. (2015, January 27\u201329). Image Recognition Based on Deep Learning. Proceedings of the 2015 Chinese Automation Congress (CAC), Wuhan, China."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/s13198-021-01415-1","article-title":"Development of Image Recognition Software Based on Artificial Intelligence Algorithm for the Efficient Sorting of Apple Fruit","volume":"13","author":"Yang","year":"2022","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep Learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.ecoinf.2018.10.002","article-title":"Deep Convolution Neural Network for Image Recognition","volume":"48","author":"Traore","year":"2018","journal-title":"Ecol. Inform."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Athiwaratkun, B., and Stokes, J.W. (2017, January 5\u20139). Malware Classification with LSTM and GRU Language Models and a Character-Level CNN. Proceedings of the 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA.","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"ref_112","unstructured":"Yue, S., and Wang, T. (2022). Imbalanced Malware Images Classification: A CNN Based Approach. arXiv."},{"key":"ref_113","unstructured":"Giger, M.L., and Karssemeijer, N. (2007). Mass Detection with Digitized Screening Mammograms by Using Gabor Features. Proceedings of the Medical Imaging, SPIE."},{"key":"ref_114","unstructured":"Nshafiei (2025, November 19). English: VGG Artificial Neural Network Design. Available online: https:\/\/commons.wikimedia.org\/wiki\/File:VGG_structure.jpg."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"El-Shafai, W., Almomani, I., and AlKhayer, A. (2021). Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models. Appl. Sci., 11.","DOI":"10.3390\/app11146446"},{"key":"ref_116","unstructured":"Walenstein, A. (March, January 28). Exploiting Similarity Between Variants to Defeat Malware. Proceedings of the BlackHat DC 2007, Washington, DC, USA."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"113022","DOI":"10.1016\/j.eswa.2019.113022","article-title":"Detecting Malware Evolution Using Support Vector Machines","volume":"143","author":"Wadkar","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_118","first-page":"14","article-title":"Malware Classification and Detection Using Artificial Neural Networks","volume":"13","author":"Rad","year":"2018","journal-title":"J. Eng. Sci. Technol."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"101748","DOI":"10.1016\/j.cose.2020.101748","article-title":"Image-Based Malware Classification Using Ensemble of CNN Architectures (IMCEC)","volume":"92","author":"Vasan","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"108731","DOI":"10.1016\/j.compeleceng.2023.108731","article-title":"AI-empowered Malware Detection System for Industrial Internet of Things","volume":"108","author":"Smmarwar","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Makandar, A., and Patrot, A. (2015, January 21\u201322). Malware Analysis and Classification Using Artificial Neural Network. Proceedings of the 2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15), Bangalore, India.","DOI":"10.1109\/ITACT.2015.7492653"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"103751","DOI":"10.1016\/j.compind.2022.103751","article-title":"Deceiving AI-based Malware Detection through Polymorphic Attacks","volume":"143","author":"Catalano","year":"2022","journal-title":"Comput. Ind."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Saridou, M., Glatard, T., and Kalout, H. (2023). Image-Based Malware Detection Using \u03b1-Cuts and Binary Visualisation. Appl. Sci., 13.","DOI":"10.3390\/app13074624"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"3770","DOI":"10.1109\/JIOT.2021.3100063","article-title":"IoT Malware Classification Based on Lightweight Convolutional Neural Networks","volume":"9","author":"Yuan","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"16946","DOI":"10.1109\/JIOT.2021.3075694","article-title":"CNN-Based Malware Variants Detection Method for Internet of Things","volume":"8","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Das, H., Pattnaik, P., Rautaray, S., and Li, K.C. (2020). A Deep Learning Approach to Image-Based Malware Analysis. Progress in Computing, Analytics and Networking, Springer.","DOI":"10.1007\/978-981-15-2414-1"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11416-019-00346-7","article-title":"Deep Learning for Image-Based Mobile Malware Detection","volume":"16","author":"Mercaldo","year":"2020","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1007\/s00521-020-05195-w","article-title":"VisDroid: Android Malware Classification Based on Local and Global Image Features, Bag of Visual Words and Machine Learning Techniques","volume":"33","author":"Bakour","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Li, S., Wu, Y., and Zou, F. (2019, January 12\u201315). A Novel Image-Based Malware Classification Model Using Deep Learning. Proceedings of the 26th International Conference on Neural Information Processing (ICONIP), Sydney, Australia.","DOI":"10.1007\/978-3-030-36711-4_14"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Su, J., Vasconcellos, V.D., Prasad, S., Daniele, S., Feng, Y., and Sakurai, K. (2018, January 23\u201327). Lightweight Classification of IoT Malware Based on Image Recognition. Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan.","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref_131","unstructured":"Agarap, A.F.M. (2017). Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach Using Support Vector Machine (SVM) for Malware Classification. arXiv."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., and Yagi, T. (2016, January 10\u201314). Malware Detection with Deep Neural Network Using Process Behavior. Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA.","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., and Thomas, A. (2015, January 19\u201324). Malware Classification with Recurrent Networks. Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, QLD, Australia.","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"El-Ghamry, A., Gaber, T., Mohammed, K.K., and Hassanien, A.E. (2023). Optimized and Efficient Image-Based IoT Malware Detection Method. Electronics, 12.","DOI":"10.3390\/electronics12030708"},{"key":"ref_135","first-page":"012165","article-title":"Android Malware Detection Method Based on Bytecode Image","volume":"1693","author":"Ding","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"108804","DOI":"10.1016\/j.compeleceng.2023.108804","article-title":"DroidEncoder: Malware Detection Using Auto-Encoder Based Feature Extractor and Machine Learning Algorithms","volume":"110","author":"Elmabruk","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"106030","DOI":"10.1016\/j.engappai.2023.106030","article-title":"A Novel Deep Learning-Based Approach for Malware Detection","volume":"122","author":"Shaukat","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_138","first-page":"11","article-title":"An Inception V3 Approach for Malware Classification Using Machine Learning and Transfer Learning","volume":"4","author":"Ahmed","year":"2023","journal-title":"Int. J. Intell. Netw."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"119593","DOI":"10.1016\/j.eswa.2023.119593","article-title":"An Effective End-to-End Android Malware Detection Method","volume":"218","author":"Zhu","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"2678","DOI":"10.1016\/j.matpr.2021.07.012","article-title":"A Review of Artificial Intelligence Based Malware Detection Using Deep Learning","volume":"80","author":"Alshaibi","year":"2023","journal-title":"Mater. Today Proc."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"022022","DOI":"10.1088\/1742-6596\/1168\/2\/022022","article-title":"An Overview of Overfitting and Its Solutions","volume":"1168","author":"Ying","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","article-title":"Defending Network Intrusion Detection Systems against Adversarial Evasion Attacks","volume":"110","author":"Pawlicki","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.inffus.2021.11.003","article-title":"Counterfactuals and Causability in Explainable Artificial Intelligence: Theory, Algorithms, and Applications","volume":"81","author":"Chou","year":"2022","journal-title":"Inf. Fusion"},{"key":"ref_144","first-page":"147","article-title":"Challenges in Implementing Artificial Intelligence on the Raspberry Pi 4, 5 and 5 with AI HAT","volume":"Volume 884","author":"Naik","year":"2024","journal-title":"Contributions Presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3\u20134, 2024, London, UK"},{"key":"ref_145","unstructured":"Warren, T. (2023, November 16). Microsoft Is Finally Making Custom Chips\u2014And They\u2019re All About AI. Available online: https:\/\/www.theverge.com\/2023\/11\/15\/23960345\/microsoft-cpu-gpu-ai-chips-azure-maia-cobalt-specifications-cloud-infrastructure."},{"key":"ref_146","unstructured":"AMD (2023, November 16). Accelerating the Future with Open, Proven, and Ready AI Solutions. Available online: https:\/\/www.amd.com\/en\/partner\/articles\/ai-ready-solutions.html."},{"key":"ref_147","unstructured":"(2023, November 16). Turning Cars into Data Centers on Wheels. Available online: https:\/\/www.avnet.com\/wps\/portal\/us\/resources\/article\/turning-cars-into-data-centers-on-wheels\/."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Rathore, R.S., Hewage, C., Kaiwartya, O., and Lloret, J. (2022). In-Vehicle Communication Cyber Security: Challenges and Solutions. Sensors, 22.","DOI":"10.3390\/s22176679"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Othman, N.A., Zainodin, M.R., Anuar, N., and Damanhuri, N.S. (2017, January 24\u201326). Remote Monitoring System Development via Raspberry-Pi for Small Scale Standalone PV Plant. Proceedings of the 2017 7th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia.","DOI":"10.1109\/ICCSCE.2017.8284435"},{"key":"ref_150","unstructured":"Pi, R. (2024, June 11). Raspberry Pi AI Kit. Available online: https:\/\/www.raspberrypi.com\/products\/ai-kit\/."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"103252","DOI":"10.1016\/j.micpro.2020.103252","article-title":"Using Distributed Raspberry PIs to Enable Low-Cost Energy-Efficient Machine Learning Algorithms for Scientific Articles Recommendation","volume":"78","author":"Besimi","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"ref_152","unstructured":"Hill, A. (2023, December 22). Raspberry Pi 5 Industrial PC Brings the Heat with Integrated NVMe SSD. Available online: https:\/\/www.tomshardware.com\/news\/raspberry-pi-5-edatec-industrial-pc-with-nvme."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/6.591665","article-title":"Moore\u2019s Law: Past, Present and Future","volume":"34","author":"Schaller","year":"1997","journal-title":"IEEE Spectr."},{"key":"ref_154","doi-asserted-by":"crossref","unstructured":"Karunaratna, S., and Maduranga, P. (2021, January 6\u20137). Artificial Intelligence on Single Board Computers: An Experiment on Sound Event Classification. Proceedings of the 2021 5th SLAAI International Conference on Artificial Intelligence (SLAAI-ICAI), Colombo, Sri Lanka.","DOI":"10.1109\/SLAAI-ICAI54477.2021.9664746"},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"8099","DOI":"10.1109\/JIOT.2020.2996784","article-title":"Collaborate Edge and Cloud Computing With Distributed Deep Learning for Smart City Internet of Things","volume":"7","author":"Wu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A Survey on Mobile Edge Computing: The Communication Perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_157","unstructured":"Electronic360 (2024, February 20). Teardown: Google Nest Hub (2nd Gen)|Electronics360. Available online: https:\/\/electronics360.globalspec.com\/article\/17053\/teardown-google-nest-hub-2nd-gen."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Lin, K.Y., and Huang, W.R. (2020, January 16\u201319). Using Federated Learning on Malware Classification. Proceedings of the 2020 22nd International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea.","DOI":"10.23919\/ICACT48636.2020.9061261"},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated Learning for Internet of Things: A Comprehensive Survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"2961","DOI":"10.1109\/COMST.2018.2849509","article-title":"Survey on Multi-Access Edge Computing for Internet of Things Realization","volume":"20","author":"Porambage","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Pant, D., and Bista, R. (2021, January 26\u201328). Image-Based Malware Classification Using Deep Convolutional Neural Network and Transfer Learning. Proceedings of the 3rd International Conference on Advanced Information Science and System, Sanya, China.","DOI":"10.1145\/3503047.3503081"},{"key":"ref_162","unstructured":"Essam, D. (2024, March 31). Transfer-Learning-on-Cifar-100. Available online: https:\/\/kaggle.com\/code\/diaaessam\/transfer-learning-on-cifar-100."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/46\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T08:25:31Z","timestamp":1768206331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":162,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["fi18010046"],"URL":"https:\/\/doi.org\/10.3390\/fi18010046","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]}}}