{"id":"https://openalex.org/W4415721761","doi":"https://doi.org/10.1007/s12145-025-02027-0","title":"Adaptive ensemble-based malware detection in smart factory IIoT using AERS-WPS algorithm","display_name":"Adaptive ensemble-based malware detection in smart factory IIoT using AERS-WPS algorithm","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415721761","doi":"https://doi.org/10.1007/s12145-025-02027-0"},"language":"en","primary_location":{"id":"doi:10.1007/s12145-025-02027-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12145-025-02027-0","pdf_url":null,"source":{"id":"https://openalex.org/S198914822","display_name":"Earth Science Informatics","issn_l":"1865-0473","issn":["1865-0473","1865-0481"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Earth Science Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033563068","display_name":"Lei Liu","orcid":"https://orcid.org/0009-0002-1350-3072"},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Liu","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101736908","display_name":"Guo Li","orcid":"https://orcid.org/0000-0001-6504-9620"},"institutions":[{"id":"https://openalex.org/I132586189","display_name":"Zhongyuan University of Technology","ror":"https://ror.org/0360zcg91","country_code":"CN","type":"education","lineage":["https://openalex.org/I132586189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Guo","raw_affiliation_strings":["School of Software, Zhongyuan University of Technology, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Zhongyuan University of Technology, Henan, China","institution_ids":["https://openalex.org/I132586189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033563068"],"corresponding_institution_ids":["https://openalex.org/I192868223"],"apc_list":{"value":2690,"currency":"EUR","value_usd":3390},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41641036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.741100013256073,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.741100013256073,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.13950000703334808,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.76419997215271},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.49570000171661377},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.45190000534057617},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4390000104904175},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43860000371932983},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.41819998621940613},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.41679999232292175},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.4016000032424927},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.39559999108314514},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.35740000009536743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7975000143051147},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.76419997215271},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5097000002861023},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.49570000171661377},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4636000096797943},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.45190000534057617},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4390000104904175},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43860000371932983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4309999942779541},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.41819998621940613},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.39559999108314514},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3580999970436096},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.35740000009536743},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.3424000144004822},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.30730000138282776},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C60777511","wikidata":"https://www.wikidata.org/wiki/Q3045002","display_name":"Concept drift","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12145-025-02027-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12145-025-02027-0","pdf_url":null,"source":{"id":"https://openalex.org/S198914822","display_name":"Earth Science Informatics","issn_l":"1865-0473","issn":["1865-0473","1865-0481"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Earth Science Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2999469381","https://openalex.org/W3122102393","https://openalex.org/W4213445692","https://openalex.org/W4289109846","https://openalex.org/W4304194063","https://openalex.org/W4308922985","https://openalex.org/W4311169516","https://openalex.org/W4311897822","https://openalex.org/W4312334973","https://openalex.org/W4315783030","https://openalex.org/W4367296576","https://openalex.org/W4376956048","https://openalex.org/W4383558957","https://openalex.org/W4383646076","https://openalex.org/W4385454058","https://openalex.org/W4387214384","https://openalex.org/W4389070905","https://openalex.org/W4390291294","https://openalex.org/W4390879901","https://openalex.org/W4391503438","https://openalex.org/W4391744351","https://openalex.org/W4393374760","https://openalex.org/W4394713629","https://openalex.org/W4394837077","https://openalex.org/W4398775393","https://openalex.org/W4402673575","https://openalex.org/W4402841739","https://openalex.org/W4403022617","https://openalex.org/W4403527546","https://openalex.org/W4404033484","https://openalex.org/W4404147594","https://openalex.org/W4404416037","https://openalex.org/W4404799493","https://openalex.org/W4405510957","https://openalex.org/W4408068764","https://openalex.org/W4409896489"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-31T00:00:00"}
